Responding To New Threats Requires A New Approach August 2012 Introduction

advertisement
A Custom Technology Adoption Profile Commissioned By Cisco Systems And Lancope
Responding To New Threats Requires A New Approach
August 2012
Introduction
Today, information security success is no longer defined by preventing attacks, but instead by how quickly
organizations can detect and contain breaches. Many enterprises fail to recognize this important shift,
overestimating their ability to stop attackers and focusing on traditional preventative controls as the anchor of their
defensive strategy. But these controls have proven ever less effective over time with the advent of new, stealthy, and
evasive attack vectors. Enlightened organizations have adopted network flow analysis capabilities to augment their
preventive controls, but fail to include the additional context necessary to truly identify malicious activity within
their networks. To be successful in this advanced threat environment, organizations must adopt new robust
detection and analysis capabilities.
Many Organizations Don’t Realize That They Have Been Breached
2011 was commonly known as the year of the breach, and thus far, 2012 is continuing the trend. Numerous highprofile companies have suffered from embarrassing headlines this year. The FBI’s former head of cyber
investigations, Shawn Henry, recently painted a bleak picture of the threat landscape: “The current public and
private approach to fending off hackers is unsustainable. Computer criminals are simply too talented and defensive
measures too weak to stop them.”1 Despite the headlines and comments from experts such as Mr. Henry,
enterprises still have a false sense of security about the integrity of their networks. Only 26% of organizations
surveyed admitted being compromised in the past year, while 23% of respondents wouldn’t disclose any
information on compromises. A shocking 46% claimed to have had no breaches in the past 12 months. A
significant portion of this group has no doubt experienced a breach, but lacked the necessary tools to identify the
compromise (see Figure 1).
Forrester Consulting
Responding To New Threats Requires A New Approach
Figure 1
Enterprises Underestimate Data Breaches
“How many times do you estimate that your firm’s sensitive data was
potentially compromised or breached in the past 12 months?”
Cannot disclose
23%
Don't know
More than 25 times in the past 12 months
11 to 25 times
Six to 10 times
Three to five times
Twice
Once
4%
0%
1%
3%
8%
6%
8%
No breaches in the past 12 months
46%
Base: 433 North American enterprise IT security professionals
Source: Forrsights Security Survey, Q2 2012
The loss or theft of corporate assets led the most common disclosed method organizations have been breached by
in the past 12 months (see Figure 2). The loss of a corporate physical asset is almost always reported. If an employee
wants to be able to continue to work, he or she must inform the information technology department in order to get
a new laptop. The loss of a physical asset is much more apparent than the loss of a digital asset. It is easy to know
when a laptop disappears, but it can be much more difficult to know when data has left your control.
Additionally, insider misuse and abuse remain a significant concern. As demonstrated by the Bradley
Manning/WikiLeaks breach, the insider threat is serious that even a highly classified “secure” government network
was victimized. The survey data confirms that the insider threat remains a significant concern. “Inadvertent misuse
by insider” and “Abuse by malicious insider” made up 40% of the breach methods (see Figure 2). If a firm doesn’t
have the necessary tools, attacks from within the organization will go unnoticed.
Page 2
Forrester Consulting
Responding To New Threats Requires A New Approach
Figure 2
Physical Asset Loss Leads Reported Breach Methods
“What were the most common ways in which the breach(es) occurred in the past 12 months?”
Cannot disclose
37%
Loss/theft of corporate asset
32%
25%
Inadvertent misuse by insider
21%
External attack targeting corporate servers or users
15%
Abuse by malicious insider
Loss/theft of business partner asset
8%
External attack targeting business partner's servers or users
6%
Don't know
6%
4%
Inadvertent misuse by business partner
Abuse by malicious business partner
1%
Other
0%
Base: 433 North American enterprise IT security professionals
Source: Forrsights Security Survey, Q2 2012
Prevention Drives Security Investment
Prevention has long been a cornerstone of defense in depth and continues to drive security investment. Prevention
technologies such as IPS are widely deployed within companies. Sixty-two percent of respondents have
implemented intrusion prevention systems (see Figure 3). Faith in prevention solutions contributes to the false
sense of security that some organizations have regarding data breaches. Contrast this investment in prevention
technologies with the 43% of respondents who have adopted network analysis and visibility (NAV) solutions. These
tools look at various types of traffic generated by networks to find anomalous behaviors and potential threats
unseen by perimeter controls. Enterprise investment in innovative detection capabilities needs to increase.
Page 3
Forrester Consulting
Responding To New Threats Requires A New Approach
Figure 3
IPS Is The Limited Cornerstone Of Defense
“What are your firm’s plans to adopt the following network security and security operations technologies?”
Not interested
Interested but no plans
Planning to implement in a year or more
Planning to implement in the next 12 months
Implemented, not expanding
Expanding/upgrading implementation
Don't know
Wireless security
Intrusion prevention system (IPS)
Network analysis and visibility (NAV)
Security information management (SIM)
2%
5% 6% 10%
2%
12% 7% 9%
9%
16%
Network access control (NAC) server side
8%
Virtualization-aware security technologies
8%
Layer 7 firewall
13%
Unified threat management (UTM) appliance
12%
24%
3%
47%
27%
44%
18%
10% 7%
21%
24%
8% 10%
10%
27%
29%
12%
29%
36%
13%
25%
14%
13%
19%
7% 10%
9%
14%
21%
11%
18%
9%
6%
16%
7%
10%
9%
10% 10%
8%
15%
6% 11%
Base: 433 North American enterprise IT security professionals
Source: Forrsights Security Survey, Q2 2012
Effective Use Of Network Flow Data Enhances Security
Network flow is built into the DNA of networks and has a long history of use within enterprises. Traditionally
rooted in network operations, information security teams now leverage the same data for detecting anomalous
behavior. Cisco and Lancope commissioned Forrester to survey IT security professionals further on the topic.
Forrester found that security teams that utilize network flow data are able to identify and respond to incidents
much faster and that today; only 16% of respondent organizations aren’t utilizing network flow data. The survey
data indicates that while IT teams may use NAV tools such as network flow analysis systems, there is still a need for
more adoption of these tools by security teams. Security monitoring without contextual information does not
provide the insight necessary to detect advanced modern threats. A comprehensive strategy leveraging flow analysis
with contextual data is imperative in today’s enterprise.
Security monitoring, traffic monitoring, and incident response are the most common uses for network flow data for
security professionals (see Figure 4). Monitoring network flows can help enterprises reduce the time it takes to
identify the root cause of many types of incidents. This applies to both security and non-security incidents that an
operations team would investigate. In these days of limited budgets, the high level of adoption is no surprise. Any
solution that can leverage existing router and switch infrastructure and be utilized by multiple groups within an
organization is easier to justify.
Page 4
Forrester Consulting
Responding To New Threats Requires A New Approach
Figure 4
Flow Record Data Use
“Is your organization using flow record data for any of the following?”
Security monitoring
62%
Traffic monitoring
55%
Incident response
51%
Capacity planning/engineering
44%
Achieving compliance
42%
Forensic investigation
40%
Services consumption
36%
Visibility
Billing
We are not currently using network flows
27%
18%
16%
Base: 55 North American enterprise IT security professionals
Source: A commissioned study conducted by Forrester Consulting on behalf of Lancope and Cisco, July 2012
Network Flow Analysis Is Powerful, But Additional Context Is Critical
Security teams are using network flows for analysis, yet with adoption so high, why do we continue to see so many
network breaches? Sixty-eight percent of survey respondents reported that they were able to detect security
incidents within seconds or minutes (see Figure 5). It is very unlikely, however, that these organizations truly have
the necessary capabilities to detect malicious activities. As a result, incident response capabilities may be overstated,
while data breaches may be understated.
In addition to network flow data, organizations need additional context to identify threats. Attackers are encrypting
traffic and exfiltrating data over common communication ports. Without additional context, only reviewing layer
3/4 packet data and flow size may not necessarily reveal malicious activity. When intellectual property is leaving an
environment, seconds count and the faster an organization is able to identify and contain a security incident the
better.
Page 5
Forrester Consulting
Responding To New Threats Requires A New Approach
Figure 5
Breaches Are Prevalent Despite Respondent Confidence In Detection Capabilities
“How long do current incident response and network troubleshooting steps take for the organization?”
Seconds
Minutes
Hours
Days
Weeks
Months
Don't know
2%
Detection of initial security event
24%
44%
24%
7%
5%
Detection of initial network issue
Identification of device(s) involved in security event
Identification of user(s) involved in security event
16%
45%
11%
9%
4%
Identification of device(s) involved in network issue
44%
27%
Remediation/mitigation of security event
Remediation/mitigation of network issue
18%
31%
51%
42%
2%
9%
33%
13%
36%
47%
45%
15%
18%
35%
7%
5%
31%
Base: 55 North American enterprise IT security professionals
Source: A commissioned study conducted by Forrester Consulting on behalf of Lancope and Cisco, July 2012
There are several key flow monitoring capabilities that organizations don’t consider important, but should. IP
reputation, device data, identity awareness, and application recognition should all have a higher importance (see
Figure 6). First, automatically associating a user with an IP address can save time by eliminating the need to
manually correlate data from server logs. Is the person associated with the IP an executive, an R&D staff member,
or an employee who routinely uses P2P applications? The response will vary greatly depending on the identity.
Next, reputation is another key contextual component. The solution must be able to leverage the vendor’s threat
intelligence network so that an analyst can quickly identify an IP address as malicious or potentially malicious is
very important. Data can be overwhelming and reputation data can be leveraged to highlight anomalous behavior.
Reputation data uses a scoring system to granularly identify potential threat traffic. Details regarding the device are
another important piece of context. What type of device is an analyst looking at and what is its disposition? Finally,
having layer 7 visibility into packets is critical. An analyst needs the ability to identify masquerading traffic and
malicious applications tunneling through HTTP.
A security analyst that is armed with network flow data enriched with context is well positioned to detect the attack
precursors from threats. The ability to detect data reconnaissance activity or covert channel communications prior
to data exfiltration is key.
Page 6
Forrester Consulting
Responding To New Threats Requires A New Approach
Figure 6
Context Is Critical, And Deserves Increased Focus
“How important is each of the following in your organization’s decision to adopt flow-based monitoring?”
Very important
4
Neutral
Device
datato—report
ability
to report
back OS
of device
Device data
— ability
back
OS of device
connected
to
network
connected to network
Identity
awareness
— associate
flows
with
Identity
awareness
— associate
flows
withusers
usersand
andtheir
their roles
roles
2
2%
22%
Application
recognition——Layer
Layer77visibility
visibility
Application
recognition
22%
Forensicinvestigation
investigation
Forensic
25%
Scalability
Scalability
27%
Incident
Incidentresponse
response
Complianceand
andreporting
reporting
Compliance
18%
18%
2%
20%
Network
Networktroubleshooting
troubleshooting
40%
25%
reputation
— ability
to include
external
IP reputation
on
IP IP
reputation
— ability
to include
external
IP reputation
on source
and
destinationof
of flows
flows
source and
destination
Identify
anomalous
Identify
anomalousbehavior
behavior
Not at all important
31%
27%
49%
31%
15%
22%
36%
31%
9%
7%
4%
33%
47%
47%
62%
51%
55%
2%
22%
42%
25%
36%
27%
4%
9%
11%
11%
2%
2%
2%
16%
2%
Base: 55 North American enterprise IT security professionals
Source: A commissioned study conducted by Forrester Consulting on behalf of Lancope and Cisco, July 2012
Base: 55 North American Enterprise IT security professionals
Source: A commissioned study conducted by Forrester Consulting on behalf of [CLIENT],July, 2012
Conclusion:
Continued Breaches Offer Organizations No Option But To Deploy Robust
NAV Solutions
To evolve with the threat landscape, organizations will shift focus from relying upon prevention technologies and
instead invest in robust anomalous behavior detection beyond traditional network flow analysis. Solutions that
offer enhanced visibility and the context necessary to quickly identify and respond to incidents will become
strategic investments for enterprises.
Endnotes
1
Source: “U.S. Outgunned in Hacker War,” The Wall Street Journal, March 28, 2012.
About Forrester Consulting
Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging
in scope from a short strategy session to custom projects, Forrester’s Consulting services connect you directly with research analysts who
apply expert insight to your specific business challenges. For more information, visit www.forrester.com/consulting.
© 2012, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available
resources. Opinions reflect judgment at the time and are subject to change. Forrester®, Technographics®, Forrester Wave, RoleView, TechRadar,
and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. For
additional information, go to www.forrester.com. [1-L48R0G]
Page 7
Download