incident response 101 - isaca response 101: you’ve been hacked, ... ensure cannot re-infect...

29
Incident Response 101: You’ve been hacked, now what? Gary Perkins, MBA, CISSP Chief Information Security Officer (CISO) Information Security Branch Government of British Columbia

Upload: phunghanh

Post on 27-Mar-2018

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

Incident Response 101: You’ve been hacked, now what?

Gary Perkins, MBA, CISSP

Chief Information Security Officer (CISO) Information Security Branch Government of British Columbia

Page 2: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

threat landscape threat actors attack vectors

incident response

preparation identification containment eradication recovery lessons learned

next steps

Agenda:

Page 4: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned
Page 5: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

Threat Actors:

students

competitors

employees (intentional)

ex-employees

intelligence agencies

political parties

contractors

dinosaurs

executives

employees (unintentional) fraudsters

script kiddies

partners

insiders

hacktivists

nation-states

organized crime

cyber-terrorists

Page 6: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned
Page 7: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

“My greatest fear is that, rather than having a cyber-Pearl Harbor event, we will instead have this death of a thousand cuts.”

Page 8: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned
Page 9: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

Attack Vectors/Methods:

social engineering

phishing

botnets

web apps

distributed denial of service (DDoS)

malvertising

supply chain, partners

removable media, USB

mobile apps

waterholing

backdoors

executive spearphishing

wireless

escalation of privileges

misconfiguration

DNS poisoning

vulnerabilities

SYN floods

buffer overflows

SQL injection

malware

weak passwords

social media

malformed packets

cross-site scripting

zero day exploits

Page 10: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

Attacks for Hire:

Distributed Denial of Service (DDoS)

volumetric attack exceeds bandwidth disrupts service

Page 11: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned
Page 12: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned
Page 13: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

Recent Phishing Example:

South Korea

Page 14: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

Attack Scenario:

Stage 0: Infection

Stage 1: Intermediates

Stage 2: Relays

Stage 3: Exfiltration

Internet

Enterprise Network

A-Team B-Team

Page 15: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

“There is widespread agreement that advanced attacks are bypassing our traditional signature-based security controls and persisting undetected on our systems for extended periods of time. The threat is real. You are compromised; you just don’t know it.” – Gartner, Inc., 2012

“Organizations face an evolving threat scenario that they are ill-prepared to deal with.” – Gartner.

“Best Practices for Mitigating Advanced Persistent Threats.” January 2012.

Page 16: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned
Page 17: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

Preparation Identification Containment Eradication Recovery Lessons Learned

PICERL

Page 18: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

No battle plan survives contact with the enemy - Colin Powell - Napoleon - George Patton - Helmuth von Moltke

Page 19: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

build a security incident response plan establish mandate, executive buy-in identify roles and responsibilities incorporate job aids and templates

build a security incident response team dedicated, virtual, outsourced invest in the team, training and other

career development

acquire necessary tools to be successful test the plan, team, and tools

table top, drills, minor events

engage and communicated with other stakeholder teams as needed

Preparation

Page 20: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

roles and responsibilities incident commander note-taking communications law enforcement, intelligence communities legal privacy forensics vendors

Preparation (con’t)

Page 21: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

jump bag/kit documentation contact lists camera, memo recorder media

USB, hard drive blank media

write-blocker live CDs, software tools hardware toolkit cables, dongles, adapters spare batteries

Preparation (con’t)

Page 22: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

capture definition of incidents in incident response plan

event: any observable occurrence in a system or network

incident: an adverse event in an information system, and/or

network, or the threat of the occurrence of such an event. Incident implies harm, or the intent to do harm

determines severity level, business impact, and drives proportionate response

ensure common understanding, engage stakeholders, manage misinformation

Identification

Page 23: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

types of incidents: a) violation of explicit or implied security policy b) unauthorized access c) denial of service d) unauthorized or inappropriate use e) changes without owner’s knowledge, instruction, or consent f) malicious code

Identification (con’t)

Page 24: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

prevent additional damage short-term containment, isolation if required forensic copy of affected systems determine if system will remain online

temporarily patch system and remove attack vector allow normal business to continue

limit spread of malware and risk of other systems being compromised

Containment

Page 25: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

removal and restoration of affected systems thorough, systematic steps taken to mitigate risk

further understand attack vector review all logs scan systems in environment look for other symptoms of compromise

permanently remove traces clean up remnants ensure cannot re-infect environment

cleaning is not enough flatten the system “nuke and pave”

Eradication

Page 26: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

return systems to normal operation re-image affected machines from known good copy

ensure systems no longer vulnerable

test, monitor, and validate as each system returned to production environment carefully re-introduce each element so as to

avoid re-infection

business decision when to execute recovery plan

Recovery

Page 27: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

hold meeting within 2 weeks of incident complete remaining documentation

valuable training material for new members

walk through and review play-by-play of incident report when and how incident detected and by whom scope and severity of incident methods used in containment and eradication

identify areas of strength - improve system security

identify opportunity areas - not about blame

Lessons Learned

Page 28: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

verify the existence of your security incident response plan and that it is up to date

buy your security incident response team members a coffee

support the development of team members and acquisition of key tools

ensure plan and team members perform regular drills table top exercises, war games, attack simulations,

cybersecurity drills, actual events

don’t forget to capitalize on lessons learned

“Always costs less to avoid a breach than to suffer one…”

Next Steps:

Page 29: Incident Response 101 - ISACA Response 101: You’ve been hacked, ... ensure cannot re-infect environment ... don’t forget to capitalize on lessons learned

Questions

Gary Perkins, MBA, CISSP

Exec Director & Chief Information Security Officer Information Security Branch Office of the Chief Information Officer