bolster your ir program - sector · bluecat cisco ios cisco meraki infoblox trinzic isc dhcpd...

47
Bolster Your IR Program Eric Sun, Solutions Mgr, Incident Detection & Response @exalted

Upload: others

Post on 06-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

Bolster Your IR Program

Eric Sun, Solutions Mgr,

Incident Detection & Response

@exalted

Page 2: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

What is the Attack Chain, and why map to it?

Today’s state of Incident Detection & Response

Rapid7 approach to Investigations

Page 3: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

• Solutions Manager – Incident Detection & Response @Rapid7

• Behavior analytics / risk management background

• Custom enterprise mobile app development – Zco Corporation

Page 4: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 5: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

• Graphical representation of steps required to breach a company

• Applies across entire range of attacks• Credential-based attacks

• Malware

• Vulnerability exploitation

• Detecting earlier in the chain = no chance for data exfiltration

Page 6: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

• Poker story: “How much you bluff?”

• Sharks• Attack the right target

• Analyze behavior to find weakness

• Attackers• Monetizable data + immature

• What’s worked before?

• IR Program: Compare against attacker maturity, not similar sized orgs

Page 7: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

Explore Network

• Get user list

• Scout targets

• Find vulnerabilities

Infiltration and Persistence

• Phish users

• Use leaked credentials

• Connect to network

• Anonymize access

• Deploy backdoors

Lateral Movement

• Access machines with credentials

• Collect more passwords

• Increase privileges

Mission Target

• Access critical data

• Upload data to external location

Maintain Presence

• Deploy backdoors

• Continued check-ins for future use

Page 8: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

Infiltration and Persistence

• Phish users

• Use leaked credentials

• Connect to network

• Anonymize access

• Deploy backdoors

Mission Target

• Access critical data

• Upload data to external location

Page 9: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

9

Unified Network

Coverage (Step 1)

• Cloud services

• Remote workers

*2016 Verizon Data Breach Investigations

Report

Attacker Recon

(Step 2)

• Network scans

• Password guessing attempts

Compromised Creds

(Step 3)

• Cannot detect with threat intel

• Present in 63% of confirmed data breaches*

Page 10: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 11: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

1. Collected in Nov 2015: 271 Security Professionals

2. 24 Questions, 10-15 minsto complete – 86% completion

3. LinkedIn, Twitter, R7 Community, Rapid7 Staff

4. Findings Report & Apple Watch

Page 12: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

12

49% 26% 26%

Page 13: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

13

Page 14: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

1. Security Information & Event Management: Deploying and maintaining SIEM

2. Reducing Attack Surface: Pen testing, vulnmanagement, web app scanning

3. Firewall: Tuning, replacing, and deploying next-gen solutions

Page 15: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

• Do you use one? (poll)

• Primary drivers:• Incident Detection

• Compliance

• Log Search

• How are they useful?

• What is being monitored?

Page 16: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

Confidential and Proprietary 16

Page 17: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

17

Page 18: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

18

Limited resources;

gaps in coverage

Security teams

are strained

62% orgs receiving

more alerts than they

can investigate

Too many

alerts

Time-consuming to

validate; jumping

between multiple

tools

Investigations take

too long

Page 19: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 20: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

Combine SIEM, UBA, and EDR

to leave attackers with nowhere

to hide.

UNIFY DETECT

Know exactly where to search

with Security Analytics.

PRIORITIZE

Find unknown threats with User

Behavior Analytics and

Deception Technology.

Page 21: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

SIEM/Log

Aggregator

Endpoint AgentLog Files

(e.g. Event, AntiVirus,

Firewall, Proxy)

User Behavior

Analytics

Use experience and

context to decide.

Is this alert real, or a

false positive?Who was impacted?

Retrace IP Addresses

to the Users Behind

Them

Review authentication

logs; Query endpoint;

Run forensics on

machine

What were the users

doing?

Gather findings.

Create & share

Super Timeline.

Combine data across

log search, user

activity, and endpoint

artifacts

• Enriched Log Search

• User Behavior

• Endpoint Data

Search across log

data; Run a hunt

Did this happen to

anyone else?

Brings together:

Page 22: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 23: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

Confidential and Proprietary 23

Page 24: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 25: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 26: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

INVESTIGATION DETAILS

Page 27: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 28: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 29: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

Deep Broad

Page 30: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 31: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 32: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 33: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 34: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 35: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 36: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 37: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 38: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 39: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 40: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 41: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

“InsightIDR arms my team of

incident investigators with the

exact information they need to

make smarter decisions.”

Fortune 500 Real Estate Investment

Trust

“Incident detection and

investigation has always been a

cumbersome, manual process.

With InsightIDR all the information I

need to understand and solve a

problem is at my fingertips.”

Jordan Schroeder

Security Architect“When you compare it to our

previous method of manually going

through logs, it’s reduced

investigation time by roughly 85

percent.”

Russ Swift

Information Security Manager

“I like the log search and the ability

to bring in logs from anywhere. Not

just from supported sources, but

any source.”

Chad KliewerInformation Security Officer

“InsightIDR is a great system. It

gives you that warm feeling inside

by catching any suspicious

behavior on the network months

before you’d otherwise discover

it…”

Tom Brown

IT Manager

Page 42: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

1. Focus on earlier detection in the chain

2. Avoid duplications per step to maximize investments

3. Identify current gaps in your program

4. Prioritize high-probability attacks (e.g. creds)

Page 43: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

Eric Sun, [email protected], @exalted

www.rapid7.com/solutions/incident-detection

Page 44: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›
Page 45: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

On-Premise

Insight

Collectors

Enterprise

Cloud Apps

InsightIDR Solution Architecture

Network

Events

Real-Time

Endpoint

Events

Intruder Traps

Applications

Existing Security

Solutions, Alerts,

and Events

InsightIDR

Attacker Analytics

Platform

Mobile Devices

Security Team

• User Behavior

Analytics

• Machine

Learning

• Fully Searchable

Data Set

Remote

Endpoints

SSL

SSL

45

Page 46: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

46

Insight Platform Supported Event Sources

FOUNDATION EVENT SOURCES

LDAPMicrosoft Active Directory LDAP

Active DirectoryMicrosoft

DHCPAlcatel-Lucent VitalQIP

Bluecat

Cisco iOS

Cisco Meraki

Infoblox Trinzic

ISC dhcpd

Microsoft

MicroTik

SophosUTM

VALUE-ADD EVENT SOURCES

› DNS

› VPN

› IDS / IPS

› Web Proxy

› Firewall

› E-mail Servers

› Security Console

› Enterprise Cloud Applications

› Intruder Traps

Page 47: Bolster Your IR Program - SecTor · Bluecat Cisco iOS Cisco Meraki Infoblox Trinzic ISC dhcpd Microsoft MicroTik SophosUTM VALUE-ADD EVENT SOURCES › DNS › VPN › IDS / IPS ›

47Insight Platform Event Sources Cont.

DNS

ISC Bind9

Infoblox Trinzic

Microsoft DNS

MikroTik

PowerDNS

Data Exporters

FireEye Threat Analytics Platform

HP ArcSight & ArcSight Logger

Splunk

VPN

Barracuda NG

Cisco ASA

Citrix NetScaler

F5 Networks FirePass

Fortinet FortiGate

Juniper SA

Microsoft IAS (RADIUS)

Microsoft Network Policy Server

Microsoft Remote Web Access

MobilityGuard OneGate

OpenVPN

SonicWALL

VMware Horizon

WatchGuard XTM

Web Proxy

Barracuda Web Filter

Blue Coat

Cisco IronPort

Fortinet FortiGate

Intel Security (fka McAfee) Web

Reporter

McAfee Web Reporter

Sophos Secure Web Gateway

Squid

TrendMicro Control Manager

Watchguard XTM

WebSense Web Security Gateway

Zscalar NSS

E-mail & ActiveSync

Microsoft Exchange Transport

Agent (Email monitoring)

OWA/ActiveSync (Ingress

monitoring, mobile device

attribution)

Firewall

Barracuda NG

Cisco ASA & VPN

Cisco IOS

Cisco Meraki

Check Point

Clavister W20

Fortinet Fortigate

Juniper Junos OS

Juniper Netscreen

McAfee

Palo Alto Networks & VPN

pfSense

SonicWALL

Sophos

Stonesoft

Watchguard XTM

IDS / IPS

Cisco Sourcefire

Dell iSensor

Dell SonicWall

HP TippingPoint

McAfee IDS

Metaflows IDS

Security Onion

Snort

Rapid7

Windows Agentless Endpoint

Monitor

Mac Agentless Endpoint Monitor

Honeypot & Honey Users

Metasploit

Nexpose

Sophos Enduser Protection

Symantec Endpoint Protection

Cloud Services

Microsoft Office 365

AWS Cloud Trails

Box.com

Duo Security

Google Apps

Okta

Salesforce.com

Advanced Malware

FireEye NX

Palo Alto Networks WildFire

SIEMs/Log Aggregators

HP ArcSight

IBM QRadar

Intel Security (fka McAfee)

NitroSecurity

LogRhythm

Splunk

Virus Scanners

Cylance Protect

Check Point AV

F-Secure

McAfee ePO

Sophos

Symantec Enduser Protection

TrendMicro OfficeScan

TrendMicro Control Manager

Application Monitoring

Atlassian Confluence

Microsoft SQL Server