Do you know where your Information Security gaps really are

advertisement
DO YOU KNOW WHERE YOUR
INFORMATION SECURITY GAPS ARE?
REDUX
Edward Vasko, CISSP
Originally Presented in 2003
What have we learned?
Disclaimer/Warning/Question
• This presentation was originally provided in 2003
• Stats provided are NOT fresh!!!
• Case studies are financially focused b/c of audience at the time
• In your opinion, how much had REALLY changed?
• Time to discuss that question at the end…
1
Agenda
• What is the current state of
Information Security?
• What are we forgetting?
• Policies, processes & procedures…Oh my!
• Case Study
• Ah, People…There’s the rub…
• Case Studies & Program Elements
• Is technology actually hurting your efforts?
• Case Studies
• Q&A
Current state of InfoSec (2003)
• Its bad out there…In the past 14 days alone…
•
•
•
•
•
“Internet Chat Seen as Tool To Teach Theft Of Credit Cards”
- New York Times
“Hacker Prevents Access to Microsoft”
- LA Times
“Hackers Attack Flaw in Cisco Equipment”
- LA Times
“University of Michigan Student Charged with Hacking”
- SC Magazine
“Web worm attacks Windows, spreads fast-experts”
- Reuters (8/11/03)
Current state of InfoSec (2003)
• Computer Security Institute (CSI) Statistics
• Organizational loss due to…
• Theft of proprietary info: $70M
• Denial of Service: $65M
• Viruses: $27M
• Website attacks
• 77% of respondents reported 2 or more attacks
• Most attacks either vandalism or denial of service
• 50% of those attacked DID NOT report it!
Current state of InfoSec (2003)
• Anti-virus vendors estimate 200 new
viruses/strains on the Net each month!
• CERT Statistics (Q1-Q2 of 2003 alone)
• 76,404 security incidents
• 1,993 vulnerabilities identified
• New stats coming out all the time to show how
bad it is…
• www.gocsi.org (Crime & Security Stats)
• http://www.cert.org/stats/cert_stats.html (Carnegie
Mellon)
• www.securitystats.com (Lots of links from Anti-virus,
web defacements and more!)
Current state of InfoSec (2003)
• Almost all stats point out one thing not mentioned in the
media…
• 80% of all security incidents occur within an organization’s
boundaries
What are
we forgetting?
These are the
traditional areas of
focus for InfoSec
•Policies
•Procedures
•Regulations
Technology
Process
Applications
•Networks
•Systems
•Databases
•Web
•Telephone
•…
“New” area
for InfoSec
People
•Awareness
•Education
What are we forgetting?
• What good are “Policies & Procedures” if no one follows
them?
• What good is technology if everyone knows how to
bypass it…Or, it doesn’t work?
• What good is a system without people?
What are we forgetting?
• Who owns Information Security?
• What good is Information Security if I can walk in and take
what I want?
• The “critical chasm” we have to cross is where people,
process & technology meet…
What are we forgetting?
•Policies
•Procedures
•Regulations
Technology
Applications
•Networks
•Systems
•Databases
•Web
•Telephone
•…
Process
People
•Awareness
•Education
Policies, Processes & Procedures…Oh My!
• Do they represent your organization’s risk
levels and needs?
• What value do they provide…Really?
• How can we get people to follow them better?
Policies, Processes & Procedures…Oh My!
• Policy – General statement by senior management to
dictate what kind of behavior (security, regulatory, etc) is
acceptable within an organization.
• Process – Specifies at a high level the methods and
controls that an organization must follow in implementing
technology in an environment (e.g. HR to IT workflow
process).
• Procedures – Detailed step-by-step actions to achieve a
specific task.
Policies, Processes and Procedures…Oh My!
• Recognizing when your “P3’s” may no longer be
supporting your organization
• Recent acquisitions?
• How often are you updating P3’s?
• How quickly are you hiring people?
• How quickly are you expanding service lines?
• What is the impact to P3’s because of these
items?
Case Study 1 – Community Bank
• Five small acquisitions in a 12-month period of
time
• Barely had time to merge technology, let alone business
policies, processes and procedures
• Had not updated documented documentation in
over 2 years
• Communication disconnect between HR and
InfoSec
• No alerts when employees left
Case Study 1 – Community Bank
• Two incidents within 1 month changed
everything…
• Disgruntled IT sys admin left the organization
• Loss of knowledge capital
• Lack of procedures to prevent this loss
• Client complaints of employees watching ESPN on their
computers
• Loss of client confidence
• Out of date acceptable use policy
Case Study 1 – Community Bank
• Remediation of risk
• Updated P3’s to handle…
• Division of duties
• No one person had all the keys/knowledge
• Cross-training & cross knowledge transfer of IT admins
• Acceptable use of Internet Policy
• Limited use to business purposes only
• Worked with HR to enforce P3 violations
Policies, Processes and Procedures…Oh My!
• What’s the value of having P3’s?
• Traditionally
• Legal “CYA” needs
• Regulatory “CYA” needs
• In reality
• They reduce/mitigate risk and are just as important as the
technology/programs we implement
Ah, People…There’s the Rub
• Who are your InfoSec owners?
• Does InfoSec stop at Technology?
• What (non-technical) controls do you need?
Ah, People…There’s the Rub
• Questions to consider…
• Who owns InfoSec in your organization?
• How do InfoSec owners know they have ownership?
• What does InfoSec have control over (digital, paper)?
Case Study 2a – Small Credit Union
• AZ Branches and service centers
• Retail branches and Mortgage centers
• Prior to program implementation:
• Passwords of users openly shared even though policy
stated not to…
• Hard drives shared openly by users
• 75% of systems had high risk factors
• Passwords easily guessable
• Weak InfoSec controls in place
• Network completely flat across business lines
Case Study 2a – Small Credit Union
• What was at risk from our assessment?
• Client record privacy
• Financial data
• Personnel records
• Bad Regulator scores…
• What was the root cause?
• Lack of staff awareness of InfoSec ownership
Case Study 2a – Small Credit Union
• Awareness Program Implementation
• Large & small group sessions held
• Risks identified for employees
• Communication procedures created
• Employees made to role play through situations
• Continued education after session through “friendly reminders”
• Information posters placed up within buildings
• E-mail newsletter created to inform users
• Sent every month with updates and kudos
Case Study 2a – Small Credit Union
• Awareness Program Implementation
• Policies developed with management support
• Employees made to sign accepting/understanding policies
• Technology used to enforce
• Purposefully involved Human Resources & Legal Dept.
• Factors added to employee review
• Asked for department volunteers to act as points of
contact
• Increased likelihood of reporting issues
• Increased response for issues
Case Study 2b – Large National Bank
• InfoSec controls are not always technical in
nature…
• This stuff happens to the big guys as well…
• Services provided around the country
• 46 branches and service locations
• Retail and commercial services
• Mortgage services
• Merchant services
• E-banking
• 1200 employees around the country
• Growth primarily through acquisition
Case Study 2b – Large National Bank
• “Great Candy” for attackers…
• Hard outer shell…Great Perimeter network security
• Banner replacements for open ports
• Outsourced web services to well known, SAS-70 backed companies
• Proxy server in place for staff to utilize when connecting out
Case Study 2b – Large National Bank
• “Great Candy” for attackers…
• Soft, chewy center…Terrible internal and physical security
• Open network between lines of business
• Complete lack of physical security controls
• Mortgage service centers in particular
• Examples to follow
Case Study 2b – Large National Bank
• Physical controls were leveraged against the
bank’s information
• To “great” results for the attacker
• We infiltrated EVERY physical location without
breaking a sweat
• Branches included
• We were able to gather client and employee data right from the
desks of the information owners
• Offered lunch in one facility
• Terrible results for the bank…
Case Study 2b – Large National Bank
• Results
• Board approval of 14 InfoSec projects
• Make up for multiple years of ignoring the issue
• Millions of dollars are now being spent by this bank in
one large sum rather than spread out over appropriate
timeframes
• InfoSec controls for “soft, chewy center”
• P3 redevelopment
• Awareness and education
• Physical control re-vamping
Case Study 2b – Large National Bank
• What was at risk?
• Well, what wasn’t at risk may be better
• External attacks from the Internet was about it
Ah, People…There’s the Rub
• If history teaches us anything…
Ah, People…There’s the Rub
• What are the possible impacts to an organization
when there is no awareness & education?
• Lack of reporting
• Lack of knowing what is right and what is wrong
• People find ways around the controls within systems
• More controls, more technology, more complexity
Ah, People…There’s the Rub
• Awareness is not…
• Sending the “once-a-year” e-mail proclaiming a list of “Do’s & Do
not’s”
• Expecting people to remember something after being told 2, 5, or
20 times
Ah, People…There’s the Rub
• Awareness is when…
• Employees are aware of the risks
• Can identify & report them
• Employees have communications on risks
• Employees take an active role in InfoSec ownership
• Awareness is created through education
Ah, People…There’s the Rub
• Program Elements
• Assess current risk levels
• Top Management support
• Clear channels of communication
• Employees should feel empowered, not accused
• Make it fun
Is technology actually hurting?
• When does technology hurt your InfoSec
efforts?
• When should technology be used (and not)?
• How to integrate non-technical controls
into your infrastructure?
Is technology actually hurting?
• When does technology hurt your InfoSec efforts?
• When it’s not configured properly…
• When vendors place too much faith in their application
controls
• Application controls are the LAST thing an experienced attacker
will leverage
• When there is a cheaper, more efficient non-technology
control
• Tech for tech’s sake is actually a stake in the heart
Is technology actually hurting?
• When should you use technology (and not)?
• Core systems/data
• Couple with a strong incident response program
• To enforce a policy
• Password settings and awareness program
• To automate a process
• HR notifications of employee departures
• To make life “easier” without compromising the
organization
• Password resets leading to inadvertent denial of service
Case Study 3a – Credit Union processing system
• Lack of system controls leads to risky
environment
• FTP and Telnet access enabled (no SSH/SSL)
• File level permissions not secured
• Application not using Trusted Computing Base (TCB)
• These controls are lacking because the vendor
believes its application controls are enough
security
Case Study 3a – Credit Union processing system
• What are the vulnerabilities?
• Easy “side paths” for attackers to get in
• No need to go through the front door
• Once an attacker is in, easy elevation of privileges
• Little/no audit trail to cleanup so little/no recourse
• What are the risks?
• Exposed client data
Case Study 3b – In-house web application
• Bank client
• Providing services to commercial clients
• Demand from clients drove RAD project
• Had in-house “development team”
• No published Software Development Life Cycle (SDLC)
• Environment
• IIS as web environment
• VBScript/ASP for language
• SQL2000 for DB
• SSL for data integrity/confidentiality
• All this was on the same system…
Let’s get graphical…
Case Study 3b – In-house web application
• Lack of application/server controls
• No integrity/boundary checking on form data
• Example - “Hi there” for SSN
• Lead to multiple examples of buffer overflows
• Microsoft’s IIS not configured properly
• Security patches not up to date
• SQLServer and firewall had port 1433 open
• ‘sa’ password set to institutional name
• We owned their system in under 20 minutes
• Access to commercial client data
Is technology actually hurting?
• Implementation of proper SDLC
• Security checks
• Version controls
• Peer reviews
• New security architecture
• Separate DB server from App server
• Firewall rules changed to block 1433
• New non-technology controls put in place
• Change management
• Incident response
Summary
• Critical chasm impacts on InfoSec
• People, Process & Technology all need to work
together
• Everyone is an owner of InfoSec
• Determining levels of ownership is key
• Physical/operational controls have impact on
InfoSec
• Choose wisely…Not all technology is good
Q&A…
?
THANK YOU!
Questions?
edward.vasko@tvrms.com
Office: 480-840-1744
info@TVRMS.com
http://www.TVRMS.com
Download