Best Practices For Cyber Security

advertisement
Best Practices For Cyber Security
November 3, 2014
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Tommy Stephens
• CPA from Woodstock, Georgia
• Twenty-nine years public accounting & private
industry experience
– Nineteen years CPE discussion leader
•
•
•
•
BSBA (Accounting) Auburn University
MS (Finance) Georgia State University
Please contact me: tommy@k2e.com
Follow me on Twitter: @TommyStephens
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
WHAT ARE THE BIGGEST CYBER
THREATS?
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Top Cybersecurity Threats
1. Social Engineering
2. Advanced Persistent
Threats
3. Internal Threats
4. Bring Your Own Device
5.
6.
7.
8.
Cloud Security
HTML
Botnets
Precision Targeted
Malware
Source: Forbes
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Social Engineering
• Using social networks such as Facebook and
LinkedIn to obtain information directly from
the networks or by misleading others
– Should you really post your vacation plans
Facebook before you go?
– Do you really know all of your “friends”?
• Also includes phishing, baiting, and computer
virus hoaxes
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Advanced Persistent Threats
• Advanced Persistent Threats (APTs) take a
“low and slow” approach
• Intention is to gain access to a network and
take information quietly
• Likely executed by a government or very
sophisticated entity as most individuals and
small organizations lack the resources to
execute
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Internal Threats
• Most data losses and breaches are committed
by insiders
• Who’s guarding your server while you are
participating in this session?
• CERT Insider Threat Center found that
malicious insiders within the financial industry
get away with their fraud for approximately 32
months before discovery
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Bring Your Own Device
• Bring Your Own Device (BYOD) is a relatively new
phenomenon where team members acquire their
own technology and use it for corporate purposes
• Though well-meaning team members can be
more productive in a BYOD environment and save
the organization money, the problem is that they
don’t secure the technology
– What happens to the corporate data when the
smartphone or tablet is lost, stolen, or hacked?
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Cloud Security
• Cloud computing is the most significant trend
in information technology today
• The cloud offers potentially huge benefits, but
the risks can be great as well because you
surrender control of your data
• Do your due diligence before engaging a
vendor to provide cloud services!
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
HTML5
• HTML5 is a relatively new markup language
being used to develop web applications
– Provides better support for multimedia and
communications with a server
• A big advantage of HTML5 over its
predecessors is cross-platform support
• However, because of its newness, many are
concerned about its security
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Botnets
• A botnet is a network created with malicious
software that exploits the computing power of
multiple private computer, without the
knowledge of the owners of those computers
• Cybercriminals often use botnets to send
spam, spread viruses, and attack other
computers and servers
• Is your computer running slowly?
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Precision Targeted Malware
• The attackers are getting smarter!
• With Precision Targeted Malware (PTM), they
are developing code that doesn’t execute
unless it is in the environment for which its’
developers designed it
• This makes it harder to detect malware in
testing environments
• “Gauss” is an example of PTM
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
What Are The Crooks After?
• Anything they can sell for a profit or hold
hostage in return for a ransom
• In other words, sensitive information!
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Two Specific Areas Of Concern For
Carolinas HealthCare System
• Credit card information
– To reduce the risk of credit card fraud, CHS is
implementing EMV readers instead of card swipes
– This should be completed by October 2015
– EMV uses PIN codes and encryption algorithms to
reduce the risk of fraud
• Vendors with weak internal controls
– “A chain is only as strong as its weakest link”
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
WHAT ARE THE COSTS OF THESE
THREATS?
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Cost Of Cyber Crime Study
• The time it takes to resolve a cyber attack has
increased by 130% in four years
• The average cost to resolve a single attack is
more than $1 million
• Organizations in defense, financial
services, and energy suffered the highest
cybercrime costs
• $188 per record breached, on average, to
respond/resolve a cyber attack
Source: Ponemon Institute
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Cost Of Cyber Crime Study
• Data theft caused major costs, 43% of the
total external costs,
• Business disruption, or lost productivity
accounts for 36% of external costs
• The average time to resolve a cyber attack was
32 days, with an average cost of $1,035,769
– $32,469 per day!
• Smaller organizations incur significantly higher
per capita costs
Source: Ponemon Institute
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Cost Of Cyber Crime
• McAfee: Malicious cyber attacks could cost
the U.S. $100 billion annually
– $300 billion worldwide
• U.S. Congressional report: Nearly 20% of all
cyber attacks are aimed at companies with
fewer than 20 employees
• Experian: Only 31% of U.S. companies have
cyber insurance policies
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Cost Of Cyber Crime
• McAfee: Malicious cyber attacks could cost
the U.S. $100 billion annually
– $300 billion worldwide
• U.S. Congressional report: Nearly 20% of all
cyber attacks are aimed at companies with
fewer than 20 employees
• Experian: Only 31% of U.S. companies have
cyber insurance policies
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
SOME SPECIFIC EXAMPLES…
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Target Debit/Credit Card Breach
• Actually, two incidents
– 40 million customers names, debit/credit card
numbers, PIN codes, expiration dates, security
code, and phone numbers were compromised
from November 27 to December 15, 2013
– Up to 70 million names, addresses, phone
numbers, and email addresses may have also
been compromised
• Cost to Target: TBD, but a similar hack at TJ
Maxx cost $256 million
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Adobe
• 38 million records, including credit card
numbers and username/password
combinations were compromised from
products and services, including Adobe
Acrobat and ColdFusion
• Notification costs alone would approximate
$17.5 million
• Assuming $188 per record, total costs could
exceed $700 million
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Republic Services
• In August 2013, laptop was stolen from
employees’ home
• The laptop contained personal information on
82,160 current and former employees
• Of course, the laptop’s hard disk was not
encrypted or otherwise protected
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Palm Beach County
Health Department
• A senior clerk was arrested and charged with
using her job to steal identity information on
more than 2,800 patients
• The clerk then shared the information,
including Social Security numbers, with
accomplices to file fraudulent income tax
returns seeking refunds
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
TEN COMMON SENSE APPROACHES
TO REDUCING CYBER THREATS
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Education Is Critical
• Most team members truly want to do the right
thing, but they often don’t know what the right
thing is
• Educate on the risks associated with cyber attacks
• Create a “culture of security and personal
accountability” across the organization
– Like all internal controls, this starts at the top of
the organization
• Includes developing and implementing policies
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Use “Long And Strong” Passwords
• Passwords can be a good first line of defense,
but are rarely as effective as they should be
• According to The SANS Institute, a “strong”
password now consists of fifteen
alphanumeric characters
• Want to test your password?
– Try https://www.grc.com/haystack.htm
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Use “Long And Strong” Passwords
• In reality, can we really expect to use different
long and strong passwords on all of our
devices, applications, and web sites?
– After all we are only human
• Consider using password management
software such as RoboForm, Password Depot,
KeepPass, and others to ease the burdens
associated with long and strong passwords
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Consider Alternative
Authentication Measures
• Fingerprint swipes instead of passwords, for
example, might prove to be more secure in
many organizations
• Multi-factor authentication is also an excellent
internal control for mitigating cyber risk
– Something you know – password, for example –
plus something you have – key fob, for example
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Limit Administrative Rights
• Most end users should not have
administrative rights on their PCs
– Yet many of them do
• Without administrative rights, end users
cannot change settings that might
compromise the security of their device
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Get A Grip On BYOD
• Bring Your Own Device, Bring Your Own Cloud,
Bring Your Own Technology are all significant
risks to every organization
• Get policies in place today
– www.tinyurl.com/k2byodpolicies
• Consider forcing security measures onto team
members’ devices as a condition of accessing
and storing personal data
– iPhone/iPad Configuration Utility, for instance
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Disable USB Ports For Storage
• USB flash drives, external hard disks, etc. are
rarely encrypted by end users
• Therefore, security risks are huge!
• You can disable USB ports for storage with an
edit to the Windows Registry
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Disabling USB Ports For Storage
Registry edit to prevent USB access to external storage
devices…IMPORTANT, backup registry first!
• Click Start, and then click Run
• In the Open box, type regedit, and then click OK
• Locate and then click the following registry
key:HKEY_LOCAL_MACHINE\SYSTEM\
CurrentControlSet\Services\UsbStor
• In the details pane, double-click Start
• In the Value data box, type 4, click Hexadecimal (if it is
not already selected), and then click OK
• Exit Registry Editor
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Thoroughly Vet All Cloud Vendors
• Though many have resisted and continue to
resist, the Cloud tsunami continues to grow
• For many smaller organizations, it is entirely
likely that moving to the cloud offers
improved security
• However, thoroughly vet any cloud vendor
before signing a contract or moving data
• Look for SSAE 16, ISO 27001, SOC 1, SOC 2,
SOC 3, etc. certifications
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Configure Firewalls Properly
• Firewalls serve as a “buffer” between two
networks – LAN and Internet, for example
• You can configure your firewalls to block
unwanted inbound as well as outbound traffic
• Ensure that both corporate level and
computer level firewalls are configured to
block intruders, as well as access to
undesirable web sites
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
“White List” Software Titles
• Instead of trying to block all “bad”
applications – which is virtually impossible,
because that list is ever-changing – consider
using a “white list” approach for approved
applications on each computer
• Windows supports this control
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
“White List” Software Titles
• In “Run” dialog box, enter “gpedit.msc”
• Navigate to “User Configuration,
Administrative Templates, System”
• Scroll to “Run only specified Windows
applications”
• Specify the applications allowed to run on
the computer
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Implement Monitoring Tools
• According to EY, anti-virus software is not very
effective against new forms of attack because
it is reactive, rather than proactive
• Rather, monitoring and analytical tools that
seek out unusual patterns in traffic should be
used as early-warning mechanisms
• Such tools may have, for example, detected
that Edward Snowden was downloading more
files than what his job duties required
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
ADVANCED CYBER SECURITY
MEASURES TO CONSIDER
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
SANS Institute
Twenty Critical Security Controls
• Based on a consortium of US and international
agencies, including US National Security Agency
(NSA)
• Prioritizes security functions that are effective
against some of the more advanced threats
• The US State Department has demonstrated a
94% decline in risk as a result of adopting these
twenty controls
• http://www.sans.org/critical-security-controls/
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Twenty Critical Security Controls
1. Inventory of authorized and
unauthorized devices
2. Inventory of authorized and
unauthorized software
3. Secure configurations for hardware
and software
4. Continuous vulnerability assessments
and remediation
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Twenty Critical Security Controls
5.
6.
7.
8.
9.
Malware defenses
Application security software
Wireless device controls
Data recovery capability
Security skills assessment and training to
fill gaps
10.Secure configurations for network devices
such as firewalls, routers, and switches
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Twenty Critical Security Controls
11.Limitation and control of network ports,
protocols, and services
12.Controlled use of administrative privileges
13.Boundary defense
14.Maintenance, monitoring, and analysis of
audit logs
15.Controlled access based on need to know
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Twenty Critical Security Controls
16.Account monitoring and control
17.Data loss prevention
18.Incident response and management
19.Secure network engineering
20.Penetration tests and red team exercises
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
WE’VE BEEN HACKED!
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
What To Do When An Attack Occurs
• Create your response plan in advance
– This is not something that should be done in the heat
of battle!
• Include on response team appropriate personnel
from IT, PR, Customer Service, Legal and all other
relevant departments in organization
• As part of the response plan, carefully consider
legal and regulatory requirements
– State security breach notification laws
– HIPAA
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
In The First 24 Hours…
1. Record date and time
of notification
2. Alert and activate
response team
3. Secure the premises
4. Stop additional data
loss
5. Document everything
6. Interview those
involved
7. Review protocols
8. Assess priorities and
risks
9. Bring in forensics team
10. Notify law
enforcement, if
necessary
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Next, And In No Particular Order
•
•
•
•
•
•
Fix the issue that caused the breach
Continue working with forensics
Identify legal obligations
Report to senior management
Identify and resolve conflicting initiatives
Alert your data breach resolution vendor
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
The preceding responses are summarized from
“Data Breach Response Guide” produced and
published by Experian Data Breach Resolution.
You may download the guide from
http://www.experian.com/assets/databreach/brochures/response-guide.pdf.
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
SUMMARY
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Summary
• The numbers aren’t pretty, as the threats
associated with cyber attacks continue to
escalate, seemingly on a daily basis
• However, by understanding where the threats
originate, we can position ourselves better to
take appropriate cyber security measures
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Summary
• When implementing cyber security measures,
look for the low-hanging fruit first…you will
get the biggest bang for your buck here
• Then, turn your attention to the more
advanced security controls found in the SANS
Institute’s Twenty Critical Security Controls
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Summary
• Despite your efforts, it is likely impossible to
completely insulate your organization from
attack and eliminate all cyber risk
• Therefore, develop, put into place, and
continually update a response plan in case
your organization is attacked
• As part of this plan, ensure that you carefully
consider all relevant legal and regulatory
requirements
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
THANKS!
Copyright © 2014 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.
Download