peak prevention: moving from prevention to resilience

38
Peak Prevention niel Miessler rector of Advisory Services, IOActive AppSec Cali January 24, 2017 Moving from prevention to resilience

Upload: daniel-miessler

Post on 20-Mar-2017

1.021 views

Category:

Internet


2 download

TRANSCRIPT

Page 1: Peak Prevention: Moving from Prevention to Resilience

Peak Prevention

Daniel MiesslerDirector of Advisory Services, IOActive

AppSec CaliJanuary 24, 2017

Moving from prevention to resilience

Page 2: Peak Prevention: Moving from Prevention to Resilience

Intro

Daniel Miessler (@danielmiessler)

18 years in infosec: mostly as a tester (net/web/app/iot)

Run the consulting practice for IOActive

Read / write / podcast / table tennis

Page 3: Peak Prevention: Moving from Prevention to Resilience

Flow Peaks and valleys

Risky bits

Impact reduction

Preparing for what’s coming

Page 4: Peak Prevention: Moving from Prevention to Resilience

Peak Oil

Page 5: Peak Prevention: Moving from Prevention to Resilience

Peak $THING

We used to have a lot of room to grow.

That growth has stopped.

We now have as much as we’ll ever have.

We need to find another source of what it was providing.

Page 6: Peak Prevention: Moving from Prevention to Resilience

Peak $THING (oil)

We used to have a lot of room to grow. (finding more oil, producing it faster)

That growth has stopped. (we found most of the oil)

We now have as much as we’ll ever have. (it’s all downhill from here)

We need to find another source of what it was providing. (energy)

Page 7: Peak Prevention: Moving from Prevention to Resilience

IMPACTPROBABILITY

RISK

Page 8: Peak Prevention: Moving from Prevention to Resilience
Page 9: Peak Prevention: Moving from Prevention to Resilience

= PreventionFocused

Page 10: Peak Prevention: Moving from Prevention to Resilience

Peak $THING (prevention)

We used to have a lot of room to grow. (add firewalls, AV)

That growth has stopped. (it can all be bypassed)

We now have as much as we’ll ever have. (kind of)

We need to find another source of what it was providing. (risk reduction)

Page 11: Peak Prevention: Moving from Prevention to Resilience

Probability Impact

RISK

909

10

Page 12: Peak Prevention: Moving from Prevention to Resilience

Probability Impact

RISK

648 8

Page 13: Peak Prevention: Moving from Prevention to Resilience

Probability Impact

RISK

09

0

Page 14: Peak Prevention: Moving from Prevention to Resilience

Acceptable 50RiskTarget

Desired

Page 15: Peak Prevention: Moving from Prevention to Resilience

Prev

entio

n (c

hanc

e of

succ

ess)

Resilience (damage taken)

1

76

3

54

2

98

10

10 9 8 7 6 5 4 3 2 1

Acceptable

42

1

Page 16: Peak Prevention: Moving from Prevention to Resilience

Probability Impact

RISK

505

10

Limit

Page 17: Peak Prevention: Moving from Prevention to Resilience

Prev

entio

n (c

hanc

e of

succ

ess)

Resilience (damage taken)

1

76

3

54

2

98

10

10 9 8 7 6 5 4 3 2 1

AcceptablePeak5?7?

30

42

1

Page 18: Peak Prevention: Moving from Prevention to Resilience

Prev

entio

n (c

hanc

e of

succ

ess)

Resilience (damage taken)

1

76

3

54

2

98

10

10 9 8 7 6 5 4 3 2 1

AcceptablePeak?

7

Impact can’t go above 6.

Page 19: Peak Prevention: Moving from Prevention to Resilience

Probability Impact

RISK

707

10

Page 20: Peak Prevention: Moving from Prevention to Resilience

Prev

entio

n (c

hanc

e of

succ

ess)

Resilience (damage taken)

1

76

3

54

2

98

10

10 9 8 7 6 5 4 3 2 1

AcceptablePeak?

7

We need to be here…

Page 21: Peak Prevention: Moving from Prevention to Resilience

Prev

entio

n (c

hanc

e of

succ

ess)

Resilience (damage taken)

1

76

3

54

2

98

10

10 9 8 7 6 5 4 3 2 1

Acceptable

We need to be here…We are here.Need to go that way

Page 22: Peak Prevention: Moving from Prevention to Resilience

Prev

entio

n (c

hanc

e of

succ

ess)

Resilience (damage taken)

1

76

3

54

2

98

10

10 9 8 7 6 5 4 3 2 1

Acceptable

We need to be here…We are here.Need to go that way

Page 23: Peak Prevention: Moving from Prevention to Resilience
Page 24: Peak Prevention: Moving from Prevention to Resilience

1 Make your data unusable when it’s stolen?

Page 25: Peak Prevention: Moving from Prevention to Resilience

2 Insure yourself against loss for when incidents do occur?

Page 26: Peak Prevention: Moving from Prevention to Resilience

3 Change the narrative so people don’t care as much.

(already happening naturally)

Page 27: Peak Prevention: Moving from Prevention to Resilience

4 Have super clean backup and restore procedures.

(ransomware)

Page 28: Peak Prevention: Moving from Prevention to Resilience

5 Have redundant sites for when yours is taken down.

Page 29: Peak Prevention: Moving from Prevention to Resilience

6 less valuable to attackers.

files

salariesMake what you haverecords

PII

secrets

Page 30: Peak Prevention: Moving from Prevention to Resilience

Prepare Yourself

Page 31: Peak Prevention: Moving from Prevention to Resilience
Page 32: Peak Prevention: Moving from Prevention to Resilience
Page 33: Peak Prevention: Moving from Prevention to Resilience

Limits of Prevention

‣ InfoSec breaches

‣ Bad work days

‣ Toxic relationships

‣ Contagious diseases

‣ Terrorism

‣ Safety accidents

‣ Impact N

‣ Impact N+1

Page 34: Peak Prevention: Moving from Prevention to Resilience

Look for Impact Reduction Everywhere

Page 35: Peak Prevention: Moving from Prevention to Resilience

PREVENTION —> RESILIENCE2017, 2018, 2019…

Page 36: Peak Prevention: Moving from Prevention to Resilience
Page 37: Peak Prevention: Moving from Prevention to Resilience

Thank You Twitter: @danielmiessler

Email: [email protected]

Github: https://github.com/danielmiessler

Podcast: https://danielmiessler.com/podcast/

OWASP Game Security Framework:https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project

Page 38: Peak Prevention: Moving from Prevention to Resilience

Resources

✴ OCTAVE: Cyber Risk and Resilience Managementhttp://www.cert.org/resilience/products-services/octave/

✴ US-CERT Cyber Risk Review (CRR)https://www.us-cert.gov/ccubedvp/assessments

✴ US-CERT Cyber Resilience Management Modelhttp://www.cert.org/resilience/products-services/cert-rmm/