security awareness, lost between chains and walls

41
Security Awareness Lost between Chains and Walls

Upload: osama-salah

Post on 15-Apr-2017

76 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Security Awareness, lost between chains and walls

Security AwarenessLost between Chains and Walls

Page 2: Security Awareness, lost between chains and walls

Everything we hear is an opinion, not a fact. Everything we see is perspective, not the truth.

“”– Marcus Aurelis

Page 3: Security Awareness, lost between chains and walls

The Weakest Link in Information Security…

Page 4: Security Awareness, lost between chains and walls

mostly People…?

Page 5: Security Awareness, lost between chains and walls
Page 6: Security Awareness, lost between chains and walls

The Weakest link…

•A popular Metaphor/Figure of Speech in Information Security.•Metaphors influence our thinking. They simplify the complex. They persuade by creating a vivid picture in our mind.•They by-pass our rationality and make us more accepting, less skeptic.

Page 7: Security Awareness, lost between chains and walls

The Weakest link…

•The chain secures our asset and is held together by links.

•We achieve security by mitigating risks through implementation of treatment plans or simply “controls”.

Page 8: Security Awareness, lost between chains and walls

ChainIf one link fails, the chain breaks.

SecurityIf one control fails, our security breaks down.

Page 9: Security Awareness, lost between chains and walls

Chain Wallsvs.

Page 10: Security Awareness, lost between chains and walls

ResilienceThe failure of one control should not lead to the total collapse of our security.A resilient security architecture is build upon defense in depth or zero-trust models.

Page 11: Security Awareness, lost between chains and walls

Incidents: From Start to End

Every breach has to start somewhere.

Not every start leads to a successful breach.Threat Events are not Loss Events.

The path to a successful breach is paved by a series of mistakes.

Page 12: Security Awareness, lost between chains and walls

ThirdPartyRemoteAccessManagement!! Network

Segmentation

! EventManagement

! SystemHardening

! EndpointProtection

!BehaviourAnomalyDetection

! DLP! VulnerabilityManagement

Page 13: Security Awareness, lost between chains and walls

STUXNET• Exploitingfourzero-dayflaws.• Signedwithstolencertificate.• WinCCdefaulthard-codedpasswordnotreset.Leakedyearsbefore(at

leastsince2008).• InfectionviaUSB (NoDeviceControl)• Enteredthroughhackedsuppliersorinterceptedcontrolsystemsinthe

supplychain.• Propagatesthroughthenetwork.(NoNetworkSegmentation)• Attemptstoaccesstheinternetanddownloadanupdate(NoEgress

Monitoring).• NoIntegrityChecks.

Page 14: Security Awareness, lost between chains and walls

HowComplexSystemsFail[RichardI.Cook,MD.CognitiveTechnologiesLaboratory,UniversityofChicago”,http://goo.gl/7Q3LOj]

• “Catastropherequiresmultiplefailures– singlepointfailuresarenotenough..”• “Overtcatastrophicfailureoccurswhensmall,apparentlyinnocuousfailuresjointocreateopportunity forasystemicaccident.Eachofthesesmallfailuresisnecessarytocausecatastrophebutonlythecombinationissufficienttopermitfailure.“

• “Post-accidentattributionaccidenttoa‘rootcause’isfundamentallywrong.”• “Becauseovertfailurerequiresmultiplefaults,thereisnoisolated‘cause’ofanaccident.Therearemultiplecontributorstoaccidents.Eachoftheseisnecessaryinsufficientinitselftocreateanaccident.Onlyjointlyarethesecausessufficienttocreateanaccident.Indeed,itisthelinkingofthesecausestogetherthatcreatesthecircumstancesrequiredfortheaccident.Thus,noisolationofthe‘rootcause’ofanaccidentispossible.Theevaluationsbasedonsuchreasoningas‘rootcause’donotreflectatechnicalunderstandingofthenatureoffailurebutratherthesocial,culturalneedtoblame specific,localizedforcesoreventsforoutcomes.”

Page 15: Security Awareness, lost between chains and walls

Tosummarize

1. Securityisnottypicallybuiltonsinglepointoffailure.

2. Ittakesmorethanbreakingasingle“Link”/Controltoresultinasignificantincident.

3. Thereisnointuitivescalewithwhichtomeasuretheweaknessofonetypeof“link”againstanother.

Page 16: Security Awareness, lost between chains and walls

Allofthisissimplebut ifwearenotconsciouslyawareofit,wemakethewrongdecisions.

Page 17: Security Awareness, lost between chains and walls

KEEPCALMAND

STAYRATIONAL

Page 18: Security Awareness, lost between chains and walls

Sticking with Metaphors

Hackers will go after “the lowest hanging fruits”

Hackers will take “the path of least resistance”

Page 19: Security Awareness, lost between chains and walls

Assumingthat“TheweakestlinkinInformationSecurityis

People” leadsustoInformationSecurityAwareness.

Page 20: Security Awareness, lost between chains and walls

IbelievethatSecurityAwareness

canbe...

Page 21: Security Awareness, lost between chains and walls
Page 22: Security Awareness, lost between chains and walls

HighExpectationsandExaggerations“MakeyourWeakestLinkyourStrongestAsset…”

MetricsWhatnotwhy…CausalityandCorrelation

Page 23: Security Awareness, lost between chains and walls
Page 24: Security Awareness, lost between chains and walls
Page 25: Security Awareness, lost between chains and walls

• Addinginsulttoinjury:“WeakestLink”,“Thinkbeforeyouclick”,“Don’ttakethatbait”

• “SecurityisEveryone’sresponsibility”isthewrongmessage.• Bettertosay:“Everyonehassomesecurityresponsibilities”

Page 26: Security Awareness, lost between chains and walls
Page 27: Security Awareness, lost between chains and walls

Motivation,Incentives,BehavioralScience,OrganizationDevelopment,ChangeManagement,LearningTheories,Gamification…

andevenPsychology

Page 28: Security Awareness, lost between chains and walls
Page 29: Security Awareness, lost between chains and walls

Beforeweaskotherswhattodo(ornottodo),weneedtomakesurewehavedoneourpart.

Page 30: Security Awareness, lost between chains and walls

Phishing

Takinganaction• DiscloseUsername/Password,ConfidentialInformation• Issuepayment..(BEC)• others

RunningMalware

Trickpeopleinto…

Page 31: Security Awareness, lost between chains and walls

Malware

Don’tOpenSuspiciousAttachments

IsourendpointsecuritystillbuiltonAntivirus?Usenext-generationendpointprotection:Sandboxing,ApplicationWhitelisting,EDR,ApplicationIsolation,MachineLearning,BehaviorAnalysis…Howeffectiveisyourattachmentscreeningsolution?Blockunnecessaryattachments,markexternalemail,blockinbounddomainemail…

Message Control

Don’tClickonsuspiciouslinks.

Page 32: Security Awareness, lost between chains and walls

Malware

UpdateYourOSandAppsregularly.

Inacompanythat’stypicallyfullymanagedbySystemsEngineersandnothingisexpectedbyenduser.Explainyourparticularimplementation.Getunderstandingwhyusersgetpopupstoreboottoapplypatches.…againwithaneffectiveEndpointsolutionconcernsaresignificantlyreduced.

Message Control

Page 33: Security Awareness, lost between chains and walls

Malware

Don’tuseunknownUSBsticksandCDs.

DeviceManagementLimitUSBaccessonlytowhatisreallyrequired.Remove/DisconnectCDDrives.…againwithaneffectiveEndpointsolutionUSB/CDtroublesaresignificantlyreduced.

Message Control

Page 34: Security Awareness, lost between chains and walls

Passwords

• UseComplexPasswords• Don’treuseyourpassword• Changeyourpassword

Areweexaggeratingtheimportanceofpasswords?PasswordComplexity,reuseandexpiryisenforcedbymostauthenticationsolutionsandapplications.Explainyourownpolicy.Whatisourcoverage?Systemsthatdon’tenforcepasswordcomplexitycansendwrongmessageorconfuseusers.User’swillchoosetheweakestpasswordthesystempermits.

Message Control

Page 35: Security Awareness, lost between chains and walls

Passwords

Don’tshareyourpassword.(Willinglyorgettrickedthroughphishing)

Whereitreallymatters:Usemultifactorauthentication(smartcard,HW/SWToken,biometricsetc.)

PrivilegedAccessManagement.

BehavioralAnalysis

Message Control

Page 36: Security Awareness, lost between chains and walls

DeviceLoss

Don’tleaveyourdevicesunattended.

Protectthedevicesothereisnoimpactifthedeviceislost/stolen:Thattypicallyinvolvesenforcingpasswords,encryption,Backup,MDMetc.

Message Control

Page 37: Security Awareness, lost between chains and walls

PhysicalSecurity

Tailgating SecurityGuards,turnstiles,Cameraanalytics(facialrecognition),multiplepeopledetection(lasers),mantrap

Ensurethatdoorstocontrolledareasclosesecurelyafterenteringorexiting.

Message Control

InstallabeepersimilartoyourfridgeJ

Challengepeoplethatattempttofollowyouthroughdoors.

• Protectwhateverassetsbehindthatparticulardoorwithadditionalcontrols.• Useasecurityguard.

Page 38: Security Awareness, lost between chains and walls

PublicWi-Fi

BecarefulwithpublicWi-Fi.Encryptedvs.unencryptedWi-Fietc.

• EncryptedWi-Fithatyoudon’tmanageisasunsecureasanonencryptedWi-Fi.• Don’tallowconnectingtocorporateresourcesunlessaVPN/Micro-VPNconnectionisutilized.

Message Control

Page 39: Security Awareness, lost between chains and walls

https:\\

Differencebetweenhttpandhttps. • Focusonscenariosrelevanttothecorporateenvironment.• UseVPN.• Avoidsendingmixedmessages.Makesureyourinternalservicesareusingvalidcertificates!

Message Control

Page 40: Security Awareness, lost between chains and walls

Summary

• AvoidExternalities:• Involvethebusinessinthedecisionmakingorfindbetterrisktreatmentplans.

• Alwaysaskifthereissomethingmorewecandobeforeaskingenduserstoplaytheirpart.• Anyaction,decisionetc.theenduserhastotakeisaneffortthatshouldnotbeunderestimated.• Focusonreducingimpact.• GetSecurityrightfirst,thanAwareness.

Page 41: Security Awareness, lost between chains and walls

Thankyou