Threa eat & & Vulner erabili lity M Managem ement: W Wher ere e do y
- you r
- u ran
ank?
Ryan Wakeham
- Sr. Director, Strategic Solutions
Threa eat & & Vulner erabili lity M Managem ement: W - - PowerPoint PPT Presentation
Threa eat & & Vulner erabili lity M Managem ement: W Wher ere e do y o you r ou ran ank? Ryan Wakeham Sr. Director, Strategic Solutions AGENDA The Threat Landscape Case Study Top 5 Questions to Ask Yourself
Ryan Wakeham
2
4
Malware, discovered in 2010, that specifically targeted Programmable Logic Controllers (PLC)
Smart cyberweapon targeting industrial infrastructure
Infect Windows OS using 4 0-day vulnerabilities
Seeks out Siemens Step 7 software in order to propagate to Siemens PLCs
Payload only targets very specific SCADA configurations
Periodically modifies attached variable frequency drives resulting in changes in motor speed
Contained a PLC rootkit that masked the changes it made by falsifying status information
5
In-depth knowledge of industrial processes Burning of four 0-days indicates a high desire for success Development estimates up to 30k hours (30 people over 6 months) – largest malware effort
in history
Self-destruct and other safeguards in code
Appeared to target an air-gapped uranium enrichment facility in Iran Physically damaged up to 1,000 centrifuges Set Iran’s nuclear program back several years
6
7
201 2014
Havex
attacks
201 2015
BlackE ckEnergy
companies
201 2016
Industroyer er
electric grid
201 2017
TRITO TON
to disrupt, degrade, or destroy industrial processes
Power grids
Conventional and nuclear power plants
Healthcare
Water, sewage, and other utilities
HVAC
Processing and refining
Oil and gas
Public transportation
Airports and seaports
Proliferation of known vulnerabilities & exploits Improved hacking skills Increased effectiveness of automated toolsets
9
Do you have methods defined for reviewing and determining actions needed for technical
vulnerabilities when they become known? And do you have capabilities to ensure these processes are working as designed?
Do you have infrastructure and application vulnerability risk acceptance and tracking
capabilities? And do you ensure the “right” people within the organization are handling risk decisions?
Do you have established Threat Intelligence and Incident Response capabilities? And are they
aligned with a comprehensive Threat and Vulnerability Management Program?
Do you have an established SDLC process inclusive of security requirements, checkpoints, and
testing?
Do you conduct Business Impact Analyses to evaluate the criticality of applications and
infrastructure with well-defined ownership of and accountability for all information assets?
11
12
Low High Maturity Level
# OF ORGANIZATIONS
Threat & Vulnerability Management Maturity
× Lack of asset / configuration
× No Threat Intel integration with
× No defined processes for evaluating technical vulnerabilities × Inability to effectively react to incidents Clear picture of the organizations most critical assets Well-defined (repeatable) process to respond to threats Mature capabilities for evaluating technology risks and plans for action Formal risk management processes in place – right stakeholders involved
13
TIM IME DISC ISCONNECTED TO TOOLS SE SECURIT ITY TO TOOLS & & MATURITY PAR ARTNER NERSHIP AMONGST ST TEAM AMS SENIOR L OR LEVEL L AWAR AREN ENESS RE RESOU OURCES
14
15
INCIDENT RESPONSE THREAT INTELLIGENCE
TECHNOL NOLOG OGY PE PEOPL PLE PROCES ESS
TECHNICAL TESTING CONFIG MGMT SOFTWARE / DEV SEC ASSET MGMT VULN / PATCH MGMT
16
First reported on Sunday (April 2) by Brian Krebs; story still developing In August, 2017, security researcher Dylan Houlihan found vulnerability on panerabread.com
Exposed millions of customer loyalty records (name, email & physical address, DOB, CC last 4)
Reported to Panera Bread’s director of information security
Panera claimed to be working on a fix Eight months later, the records were still available and could be crawled and indexed Asked whether he saw any indication that Panera ever addressed the issue he reported in August 2017 until today, Houlihan said no. “No, the flaw never disappeared,” he said. “I checked on it every month or so because I was pissed.” Further investigation showed that there may have been close to 40 million customer records
exposed
17
https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/
Do you have these elements in place? How well do you think they are working? What are you missing?
Identify immediate needs / quick wins
Conduct more thorough analysis using the framework Determine how effectively components are really working
18
TVM CHECKLIST Resources Plan Time allocated Measurement Budget Executive sponsorship
612-455-6977 RYAN@NETSPI.COM WWW.NETSPI.COM
19