Securing the Digital Transformation Overview Largest Data Breaches - - PowerPoint PPT Presentation

securing the digital transformation
SMART_READER_LITE
LIVE PREVIEW

Securing the Digital Transformation Overview Largest Data Breaches - - PowerPoint PPT Presentation

Securing the Digital Transformation Overview Largest Data Breaches Hacks resulting in loss of more than 30,000 records uTorrent Philippines Banner Mail.ru Commission on Health 25000000 Anthem Verizon Elections 800000000 55000000


slide-1
SLIDE 1

Securing the Digital Transformation

Overview

slide-2
SLIDE 2

2

Digital Transformation Realized™

Latest 2015 2014 2013

Hacks resulting in loss of more than 30,000 records

Source: Informationisbeautiful.net

Largest Data Breaches

JP Morgan Chase 76000000

Target

70000000

AOL 2400000

Ebay

MySpace 164000000

Experian / T-Mobile

Anthem 800000000

Banner Health

Mail.ru 25000000 Linux Ubuntu forums

Clinton Campaign

Carefirst

British Airways AshleyMadison.com

Adult Friend Finder Dominos Pizzas (France)

Evernote 50000000

Home Depot 56000000

European Central Bank

Kromtech

MSpy Japan Airlines

Philippines’ Commission on Elections 55000000 Telegram Securus Technologies 70000000

NASDAQ

Sony Pictures

Nintendo Neiman Marcus Staples OHV Scribd

US Office of Personnel Management (2nd Breach)

VK 100544934

Vtech

UPS

Yahoo Japan

Washington State Court System

Twitch TV Ubuntu Wendy’s

Verizon

uTorrent Syrian Government

Adobe 36000000

Central Hudson Gas & Electric National Childbirth Trust Hacking Team CarPhone Warehouse Invest Bank Community Health Services Apple A&B Altegrity

Mac Rumours .com

Premera

LivingSocial 50000000

TalkTalk

US Office of Personnel Management
slide-3
SLIDE 3

3

Digital Transformation Realized™

Economic Impact from Cybercrime

$162m $1 billion $171m

Target JPMorgan Sony

slide-4
SLIDE 4

4

Digital Transformation Realized™

Risk Mitigation and Digital Transformation

The Digital Transformation is driving change in the way IT is leveraged throughout the business The way IT is secured and risks mitigated within the business will also rapidly evolve as threats enter new vectors The technologies for mitigating risks are a combination of longstanding best practices and modern capabilities The defense against the modern (and existing) threats of the Digital Transformation start now

1 2 3 4

slide-5
SLIDE 5

The Digital Transformation is driving change in the way IT is leveraged throughout the business

slide-6
SLIDE 6

6

Digital Transformation Realized™

Companies are Becoming More Digital

Enabling the customer experience with technology Enabling partner interactions through technology Driving efficiency in internal operations

Customers Partners Employees

slide-7
SLIDE 7

7

Digital Transformation Realized™

Transformative vs. Non-Transformative

slide-8
SLIDE 8

8

Digital Transformation Realized™

Digital Transformation

Modern Applications

IoT, Mixed Reality, Collaboration, ECM, BPM

Secure Modern IT Management

DevOps and IT Service, Business Process Transformation, Governance

Customer Engagement

CRM, Extranets, B2B solutions

Cloud Data Center

Identity & Device Management , Cloud Integration & Management, Unified Communications

Analytics & Data

BI, SQL, Predictive Analytics, Big Data

Mobile Secure Mobile

slide-9
SLIDE 9

The way IT is secured and risks mitigated within the business will rapidly evolve as threats enter new vectors

slide-10
SLIDE 10

10

Digital Transformation Realized™

Top New Threats with Financial Impact

Customer User Database Compromise IoT Device Compromise Internal Identity Compromise Confidential Data Compromise Predictive Analytics Compromise Source Code Compromise Social Engineering Theft Physical Access paired with Theft

slide-11
SLIDE 11

11

Digital Transformation Realized™

Modern Security Layers to Mitigate Risk

Network Operating System Identity Application Information Communications Management Physical

slide-12
SLIDE 12

12

Digital Transformation Realized™

NIST Security Framework

Detect Respond Recover Protect

Digital Transformation

Identify

slide-13
SLIDE 13

13

Digital Transformation Realized™

Risk Mitigation Combining Layers and NIST

Detect

 Big data detection patterns

Respond

 Automated response mechanisms

Recover

 Declarative configuration

Protect

 Cloud consistent protection patterns

Digital Transformation

Identify

 Cloud threat identification

Network Identity Application Information Communications Management Physical Operating System

slide-14
SLIDE 14

14

Digital Transformation Realized™

Modern Security Layers and NIST

Detect Respond Recover Protect

Digital Transformation

Identify

Network

The extent to which traffic can reach the intended destination based on its qualities, being from a known source, appropriate port, and of certain characteristics. Millions of hacked agents Network boundary is everywhere Applications are customer facing

slide-15
SLIDE 15

15

Digital Transformation Realized™

Modern Security Layers and NIST

Detect Respond Recover Protect

Digital Transformation

Identify

Operating System

The extent to which the operating system is protected from attack based on its inherent flaws, as well as the extent to which it provides for modern protections from modern invasive approaches. Out-of-Date Operating Systems Your clients are your network boundary IoT clients, mobile, and devices exposed

slide-16
SLIDE 16

16

Digital Transformation Realized™

Modern Security Layers and NIST

Recover Detect Respond Protect

Digital Transformation

Identify

Identity

The extent to which authentication to an application provides a more important role in security in the modern age, as well as what access the authenticated person has based on role based access control. Weak passwords everywhere Applications not properly identity secured Brute force techniques increasing in capability

slide-17
SLIDE 17

17

Digital Transformation Realized™

Modern Security Layers and NIST

Recover Detect Respond Protect

Digital Transformation

Identify

Application

The security of the actual application itself, as was tested and written using patterns and practices which mitigate known threats and attack vectors. Applications using APIs and features with known flaws Interaction between application components Boundary security flaws on endpoint

slide-18
SLIDE 18

18

Digital Transformation Realized™

Modern Security Layers and NIST

Detect Respond Recover Protect

Digital Transformation

Identify

Information

The extent to which documents and data are protected regardless of location and are controlled based on their qualities. Confidential information is widely accessible Secure content is used to gain other content Users who “should” have access change

slide-19
SLIDE 19

19

Digital Transformation Realized™

Modern Security Layers and NIST

Management

The extent to which management tools have evolved to address modern threats which require analysis and response exceeding manual effort. These scenarios look more like “big data” and machine learning scenarios than manual reviews and responses that traditional security practices employed.

Detect Respond Recover Protect

Digital Transformation

Identify Breadth of threats exceeds human capabilities Response needs are immediate Employees not properly trained

slide-20
SLIDE 20

20

Digital Transformation Realized™

Modern Security Layers and NIST

Communications

The extent to which application communications (or even personal communications) are protected and private based on identity and application qualities. No assurance that the network is secured Modern devices are connected to the internet Pass-the-Hash, Password Extraction Detect Respond Recover Protect

Digital Transformation

Identify

slide-21
SLIDE 21

The technologies for mitigating risks are a combination of longstanding best practices and modern capabilities

slide-22
SLIDE 22

22

Digital Transformation Realized™

NIST CSF to Category / Microsoft technology map

Mapping in Technology Solutions

Protect (PR) Data Security (PR.DS): Information and records (data) are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability

  • f information.

PR.DS-3: Assets are formally managed throughout removal, transfers, and disposition PR.DS-4: Adequate capacity to ensure availability is maintained Cloud Datacenter Operations Management Suite & System Center Modern IT Management PR.DS-5: Protections against data leaks are implemented Customer Enablement Enterprise Mobility Suite Cloud Datacenter Operations Management Suite & System Center Modern IT Management Azure Resource Management Standards Office365 PR.DS-6: Integrity checking mechanisms are used to verify software, firmware, and information integrity Customer Enablement Enterprise Mobility Suite Modern IT Management Operations Management Suite & System Center PR.DS-7: The development and testing environment(s) are separate from the production environment Cloud Datacenter Azure Resource Management Standards Modern IT Management Visual Studio Team Services

PR.IP-1: A baseline configuration of information

technology/industrial control systems is created and maintained Modern IT Management Operations Management Suite &System Center ServiceNow

PR.IP-2: A System Development Life Cycle to manage systems

is implemented Modern IT Management Visual Studio Team Services Operations Management Suite & System Center ServiceNow

slide-23
SLIDE 23

23

Digital Transformation Realized™

Tool Categories and Mapping

ServiceNow Operations Management Suite Visual Studio Team Services Azure Machine Learning

Modern Service Management Platform Modern Operational and Automation Platform Modern Development Platform Predictive Analytics

slide-24
SLIDE 24

24

Digital Transformation Realized™

Tool Categories and Mapping

Enterprise Mobility + Security Suite Office365 Dynamics 365 Azure Platform as a Service Azure Cloud Platform, Windows Server Azure Stack Windows 10 Microsoft IoT Platform

Client Management Platform Collaboration and Business Process Platform Cloud Platform End User Computing Platform

slide-25
SLIDE 25

25

Digital Transformation Realized™

Anatomy of Attacks and Defense

ServiceNow Dynamics Power BI System Center SCCM MIM ATA Azure Stack VM Ware Network EMS OMS USTS Azure ML

Log Data ARM + DSC Code Inventory Log Data Log Data Inventory Automation Log Data/IDS ARM + Code DSC Log Data

I I IoT Suite

slide-26
SLIDE 26

Demo

slide-27
SLIDE 27

The defense against the modern threats of the Digital Transformation start now

slide-28
SLIDE 28

28

Digital Transformation Realized™

Steps to Starting Out

Admit that you can do better Know that you can always do better Make a plan for addressing the security threats that are most relevant based on risk and financial impact

First Second Then

slide-29
SLIDE 29

29

Digital Transformation Realized™

Who Do You Want to Be?

Disorganized, Hidden, Unprepared Organized, Transparent, Prepared

slide-30
SLIDE 30

30

Digital Transformation Realized™

Get Specific with Assessments

Discover Assess ID System Owner Business Process Hardware Product Software Product Configuration Threat Vulnerability Controls Impact (Low-Med- High) Complexity (Low-Med- High) Risk (Low-Med- Hgih) Priority 00001 Workstations and Servers Denise Smith X Privilege Escalation Local Administrators LAPS High Low High 1 00002 Active Directory Qiong Wu X Unauthorized Use Privileged Accounts MIM PAM Med Med Low 4 00003 Workstations and Servers Naoki Sato X Code Execution Patching SCCM X Med Med 3 00004 Business Culture Daniel Roth X Social Engineering Phishing KnowBe4 High Low High 2 00005 WiFi Andrea Dunker X Unauthorized Use Pre-shared Key 802.1X Low High Med 5 00006 Workstations and Servers Eric Gruber X Business Data Loss Malicious Software Device Guard High High Med 6

slide-31
SLIDE 31

31

Digital Transformation Realized™

Concurrency’s Engagements

Review, assess and make a plan, strategic and tactical, working with CISO Address threats through targeted process improvements, technologies, and education Develop a backlog and keep improving the security state

Plan and Design Execution Continuous Improvement

slide-32
SLIDE 32

32

Digital Transformation Realized™

Key points

Understand that security is not something to procrastinate on Leverage NIST CSF to develop a prioritized plan Address key operating system and identity threats first Don’t underestimate the importance of a security management platform

1 2 3 4

slide-33
SLIDE 33

33

Digital Transformation Realized™

Digging into the Details

Presentations on individual scenarios for the Digital Transformation, including:

Securing the Client to Application Threat: Part 1 Securing the Client to Application Threat: Part 2 Securing Content and Communications

You will have access to the NIST to Technology Mapping, the whitepaper, and this presentation through a follow-up call

slide-34
SLIDE 34

Part 1: Securing the Client

An Employee, their Laptop and a Hacker walk into a Bar…

slide-35
SLIDE 35

35

Digital Transformation Realized™

We are not an appealing target for attackers, I’m probably

  • fine. I couldn’t stop them anyway.

An attacker would need to get someone’s password to start hacking on us. Breaking into our Network would require an experienced and sophisticated attacker.

What do you think?

slide-36
SLIDE 36

36

Digital Transformation Realized™

 I’m using some of the laziest methods  They are easy to demo and understand  Much better methods and tools are available  They are easy to use, but might feel abstract

Attack Methods in this Demo

slide-37
SLIDE 37

37

Digital Transformation Realized™

Attack Pyramid

Entry Reconn & Movement End Goal / Exfiltration

slide-38
SLIDE 38

38

Digital Transformation Realized™

Attack Plan

slide-39
SLIDE 39

39

Digital Transformation Realized™

BitLocker Would have prevented access to the file system

 Is built-in to Windows Enterprise/Pro Edition  Manage with GPO, MBAM, AAD Join / Intune − “InstantGo” capable devices (aka Connected Standby) − Microsoft Surface/Book, Lenovo ThinkPad, Dell Venue

What could have stopped that?

slide-40
SLIDE 40

40

Digital Transformation Realized™

 Conditional Access  Single Sign On  Enterprise State Roaming  MDM Registration / Intune  New Intune Portal!

Azure AD Join / Domain Join++

slide-41
SLIDE 41

41

Digital Transformation Realized™

Social Engineering

 Walk-up Access in office  Phishing with Macros  Remote Command and Control

What else could have happened?

slide-42
SLIDE 42

Let’s go Phishing

slide-43
SLIDE 43

43

Digital Transformation Realized™

Macro Security settings GPO to “Disable all except digitally signed”

 GPO for Trust Center/Trusted Locations  Client Activity Analysis with Defender ATP

What could have stopped that?

slide-44
SLIDE 44

What’s on this Laptop?

slide-45
SLIDE 45

45

Digital Transformation Realized™

 BitLocker (indirectly) − Encrypts the file system, not files  Azure Information Protection (Azure RMS) − Encrypts individual files by user action*  Windows Information Protection (WIP , prev. EDP) − Encrypt “Enterprise Data” by device policy

What could have stopped that?

slide-46
SLIDE 46

Where’s the Network?

slide-47
SLIDE 47

47

Digital Transformation Realized™

Local Admins can export Wifi Profiles

 Exports any network saved by any user  Also exports client-side certificates − Ensure the cert private key is not Exportable − Consider using RADIUS authentication  Consider managing Wifi setting with GPO/MDM

What could have stopped that?

slide-48
SLIDE 48

48

Digital Transformation Realized™

Attack Pyramid

Entry Reconn & Movement End Goal / Exfiltration

slide-49
SLIDE 49

Part 2: Securing the Servers

slide-50
SLIDE 50

50

Digital Transformation Realized™

Attack Plan

slide-51
SLIDE 51

51

Digital Transformation Realized™

− LAPS / Better Passwords

  • Generate and Rotate STRONG Local Admin Passwords

− Device Guard / AppLocker (for non-admins)

  • Prevent running unsigned applications (mimikatz)

− Credential Guard

  • Prevent dumping hashes

− Advanced Threat Analytics

  • Detected machine account querying AD

What could have stopped that?

slide-52
SLIDE 52

52

Digital Transformation Realized™

 LAPS − Randomize and Change STRONG Local Admin Passwords  Windows Firewall − Block RDP / Disable RDP , allow trusted sources  Group Policy − Prevent Remote Use of Local Accounts  Network Segmentation − Separate Client and Servers networks with ACLs

What could have stopped that?

slide-53
SLIDE 53

What’s on this Server?

slide-54
SLIDE 54

54

Digital Transformation Realized™

Group Managed Service Accounts

− Passwords managed by Machines, not saved in registry  Device Guard / AppLocker − Prevent running unsigned applications  GPO / Access Control − Prevent Service Accounts from logging in remotely  Monitor with OMS / SysMon

What could have stopped that?

slide-55
SLIDE 55

55

Digital Transformation Realized™

Attack Pyramid

Entry Reconn & Movement End Goal / Exfiltration

slide-56
SLIDE 56

56

Digital Transformation Realized™

Digital Transformation Realized ™

@MrShannonFritz

Attack Plan

slide-57
SLIDE 57

Stealing AD from the Shadows

slide-58
SLIDE 58

58

Digital Transformation Realized™

 Network Segmentation − Restrict network access to the DC’s  GPO / Access Control − Prevent Non-Domain Admin’s from logging in to DC’s − Prevent Domain Admin’s from being using on Non-DC’s  Isolation / Protection − Restrict access to the DC’s Physical / Virtual hardware

What could have stopped that?

slide-59
SLIDE 59

59

Digital Transformation Realized™

Attack Plan

slide-60
SLIDE 60

60

Digital Transformation Realized™

Attack Mitigation Plan

stickykeys hijack remote shell macro data theft wifi psk dump reconnaissance rdp vss copy ntds.dit bitlocker macro security gpo azure rms wip certifitate wifi defender atp service secrets gpo aad join / intune ata gmsa device guard isolation gpo / dsc skeleton key krbtgt golden ticket device guard

  • ms / sysmon
slide-61
SLIDE 61

61

Digital Transformation Realized™

NIST Cybersecurity Framework Core Identify

  • Asset Inventory
  • Patches and Updates
  • Risk Management
  • Policies

Protect

  • Credentials & Identity
  • Network Access
  • User Training
  • Data Security
  • Baseline Configuration

Detect

  • Nefarious Activity
  • Malicious Code
  • Unauthorized Users
  • Unauthorized Devices
  • External Services

Respond

  • Investigations
  • Forensics
  • Incidents
  • Containment
  • Public Relations

Recover

  • Business Continuity
  • Communications

Microsoft and 3rd Party Products

  • OMS : Operations

Management Suite

  • SC Operations Mgr
  • SC Configuration Mgr
  • SC Service Manager
  • Intune
  • Cloud App Security
  • ServiceNOW
  • MIM : Identity Mgr
  • MIM PAM
  • AAD Premium / PIM
  • Azure MFA
  • Intune
  • Conditional Access
  • Azure App Proxy
  • BitLocker
  • Office 365 ATP
  • OMS
  • Advanced Threat

Analytics

  • OMS
  • Azure AD Premium
  • Defender ATP
  • Cloud App Security
  • O365 Compliance Cntr
  • Lookout App Security
  • OMS
  • SC Service Manager
  • ServiceNOW
  • Hyper-V
  • Storage Replica
  • DFS
  • OneDrive for Business
  • OMS : Site Recovery
  • SC DPM
  • Veeam
  • ServiceNOW
slide-62
SLIDE 62

62

Digital Transformation Realized™

 Sami Laiho – wioski.com  Sean Metcalf – adsecurity.org  Rob Fuller – mubix, room362.com, hak5  Paula Januszkiewicz – cqureacademy.com  Robert Reif – cynosure prime password research  Michael Goetzman – cyphercon.com  Marcus Murray & Hasain Alshakarti – Truesec  Troy Hunt – haveibeenpwned.com, troyhunt.com

Acknowledgements / Learn More

slide-63
SLIDE 63

Securing Content and Communication

slide-64
SLIDE 64

64

Digital Transformation Realized™

Securing Content and Communication

Review of security issues with content and communications scenarios and live review of example Review of technologies to protect content and communications scenarios and live review of example How to get started with protecting content and communications scenarios through both policy and technology

slide-65
SLIDE 65

65

Digital Transformation Realized™

Data protection realities

87% of senior managers admit to regularly uploading work files to a personal email or cloud account.*

87%

58% have accidentally sent sensitive information to the wrong person.*

58%

Focus on data leak prevention for personal devices, but ignore the issue on corporate

  • wned devices where the risks

are the same

? %

slide-66
SLIDE 66

66

Digital Transformation Realized™

Security Issues with Content and Communications

Confidential content is everywhere Content needs to be shared, despite its security status Certain locations should never access content Content is shared when not intended to be

slide-67
SLIDE 67

67

Digital Transformation Realized™

Modern Content Security Needs

Protect various content types Protect in-place and in-flight Share with anyone securely Important applications and services are enlightened Meet with varied

  • rganizational

needs Protect everywhere and layer security

slide-68
SLIDE 68

68

Digital Transformation Realized™

Technical Solution Layers Applied

Network

  • Location Awareness for Office365 w/ MFA

Application

  • Office365 applies Azure Information Protection

Information

  • Azure Information Protection

Operating System

  • Local Bitlocker Encryption

Identity

  • EM+S with Azure Active Directory Platform

Management

  • Operations Management Suite (OMS)
  • Enterprise Mobility + Security
  • ServiceNow
slide-69
SLIDE 69

69

Digital Transformation Realized™

Steps to Starting Out

Define corporate content types and scenarios based on business use cases and

  • rganizational policies

Build rights management policies based on defined business requirements Incrementally roll out location awareness and Azure Information Protection based

  • n the defined rights management policies and business requirements
slide-70
SLIDE 70

70

Digital Transformation Realized™

Concurrency’s engagements

Plan and Design Review, assess and make a plan, strategic and tactical, working with CISO Execution Address threats through targeted process improvements, technologies, and education Continuous improvement Develop a backlog and keep improving the security state

slide-71
SLIDE 71

Thank you!