To view drawing guides: 1. Right-click outside slide and select ’Grid and Guides...’

advertisement
Nets Information Security
Risikoanalyse og testing: med perspektiv fra frontlinjen
Stig Torsbakken – Nets SIRT
C
l
i
c
k
t
o
e
d
i
t
Agenda
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Nets
Nets threat landscape
Nets security testing
Seurity testing and security incidents
2
C
l
i
c
k
t
o
e
d
i
t
Nets
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
3
Three lines of defence
C
l
i
c
k
t
o
e
d
i
t
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Risk management in Nets is organized around the 3 lines of defence model
(Ref. ECIIA & FERMA “Guidance on the 8th EU Company Law Directive”)
1
1st Line of Defence
2
3
2nd Line of Defence
Operational
management
Control, policy and
framework
3rd Line of Defence
Audit
Board of Directors
Executive Management
Group Management (GM)
Reporting
Reporting
Reporting
1
2
Information Security,
BUs/GUs &
Management Control
Activities
Requirements
Reporting
Risk management
(Risk, Security, Compliance,
Quality, Continuity)
Reporting
& advising
Requirements
Reporting
3
Internal
Systems
Audit
External
Audit
Coordinating
efforts
Customers
4
C
l
i
c
k
t
o
e
d
i
t
Nets security
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Simplified
1
Information Security,
BUs/GUs &
Management Control
Activities
Orientation
Threat
Technical
Operational
2
Risk management
(Risk, Security, Compliance,
Quality, Continuity)
Orientation
Compliance
Business
Risk
5
C
l
i
c
k
t
o
e
d
i
t
Nets SIRT security incidents 2013
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Critical
2
High
11
Medium
81
Low
27
Category
Malicious code
infection
Exposed to
malicious code
Vulnerability
121
Reconnaissance
DDoS
Service
Client
Suspicious user
activity
Perimeter
Policy violation
User
Exercise or
network defense
testing
Access
NemID
Phishing
Guest
network
6
C
l
i
c
k
t
o
e
d
i
t
Nets SIRT security incidents 2013
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
7
C
l
i
c
k
t
o
e
d
i
t
DDoS attack April 10
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
NemID down for 7 hours
Gruppe tager ansvar
for NemID-angreb:
Vil forsøge at slå til igen
En gruppe, der via Twitter har taget
ansvaret for torsdagens angreb mod
NemID, siger, at de vil forsøge at få
login-tjenesten til at gå ned igen.
8
C
l
i
c
k
t
o
e
d
i
t
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
C
l
i
c
k
t
o
e
d
i
t
Security testing in Nets
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
In numbers – Nets Norway
Vulnerability scanning
External: 4
Internal: 4+
Scanningless scanning: 365
Pentesting
New applications/systems: approx. 1 every week(!)
Yearly pentests: 20
Risk analysis
Yearly risk analysis of all infrastructure
Risk analysis of new services
How is this possible?
1 FTE (to be 3-4) dedicated to pentesting
25-30 security officers in Nets in total
Heavy use of consultants and 3rd party vendors
Narrowing scope
10
C
l
i
c
k
t
o
e
d
i
t
Security testing in Nets
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Vulnerability scanning
Quarterly external scan
Quarterly internal scan
Scanningless scanning
11
C
l
i
c
k
t
o
e
d
i
t
Security testing in Nets
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Pentesting
Typical findings
Input validation
Application vulnerabilities
Default passwords
Vulnerable/unsecure protocols
Missing authentication/source verification
Design flaws
60% of findings through manual tests
Narrow scope
Narrow scope
Narrow scope
12
C
l
i
c
k
t
o
e
d
i
t
Security testing in Nets
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Pentesting
How to narrow scope?
Tool-support
Nessus
Nmap
AppScan
Metasploit
soapUI
Burp Suite
ZAP (Zed Attack Proxy)
13
C
l
i
c
k
t
o
e
d
i
t
Security testing in Nets
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Pentesting
How to narrow scope?
Risk analysis involving pentest team
Business side priorities
Structured walk-through of functionality
Thorough system presentation
Pentest team involved in software development phase
Pentest team involved in security arcitechture design
14
C
l
i
c
k
t
o
e
d
i
t
Security testing and security incidents
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Threat
intelligence
Risk
analysis
Vulnerability
scans
Pentests
Vulnerability
management
Patch
level
Security
incident
Inventory
control
15
C
l
i
c
k
t
o
e
d
i
t
Security testing and security incidents
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Nets SIRT vulnerability management procedure
Nets pentest/vulnerability scan findings
Priority:






Major
1&2

affect production systems
remote exploitable
would cause a Major 1 or 2 incident if exploited
do not affect production systems
not remotely exploitable (only internally)
would cause a Major 1 or 2 incident if exploited after
system is released
do not require immediate actions
3
4
16
C
l
i
c
k
t
o
e
d
i
t
Security testing and security incidents
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Threat
intelligence
Security
incident
Risk
analysis
Vulnerability
scans
Pentests
Vulnerability
management
Inventory
control
Patch
level
17
C
l
i
c
k
t
o
e
d
i
t
Fully implemented DDoS protection
M
a
s
t
e
r
t
e
x
t
s
t
y
l
e
s
Project «DDoS Shield»
18
Download