Daniel Maloney - Verizon

advertisement
Daniel Maloney
Deputy CSO
Verizon
STRATEGY AND ROADMAP / INSIDER THREATS
Dan Maloney, Deputy CSO, Executive Director,
Insider Threat
Confidential and proprietary materials for authorized company personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Insider Threat in the News
“Edward Snowden Used Inexpensive „Web Crawler‟ to Hack NSA Networks” – HGN News…
“Home Depot hackers used vendor log-on to steal data, emails” – USA Today…
“Target Earnings Slide 46% After Data Breach” – Wall Street Journal
“AT&T Admits Insider Illegally Accessed Customer Data” – securityweek.com…
“F.B.I. Failed to Act on Spy, [Robert Hannsen] Despite Signals, Report Says” – NY Times…
“Encryption Faulted in TJ MAXX Hacking” – Washington Post…
“Fallout from Sony hack may alter how Hollywood conducts business” LA Times…
These issues were end results of existing weaknesses.
Proprietary and Confidential – Not for Disclosure Outside of company
3
Insider Threat, Supply
Supply Chain
Study
Chain
Findings





Foreign company ownership
Offshoring provisioning non-compliance
Subcontracted without approval
Expired contracts
Fraudulent transactions
Don’t rely on a contract for compliance
Confidential and proprietary materials for authorized company personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
4
Insider Threat. Vulnerability Study
• On 6/4/2015 – A Verizon senior leader received a
text message on his personal (unpublished) cell
phone
– Anonymous researcher claims to have found an exploit that
exposed customer information
– Claimed he “didn‟t know who to call so…”
– Offered to “show us how it was done”
• Researcher wouldn‟t reveal his identity
• Wanted money for his information
– Stated that if we didn‟t have a bug bounty program
he wasn‟t interested and would move on
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
5
Insider Threat, Social Engineering
Attacker Calls from 5/15 to 10/16
_____________________________________________
Attacker came after Verizon from May thru October 2015.
Most active period of attacks was August thru Oct.
During
Victim
at the
two of
this period, the attacker was primarily focused on
1, though would pivot to the other names on the list
same time. During one period, we had a compromise on
the VIP accounts on the same day.
Including this issue, this is the 4th significant incident
with VendorX in the 18 months, of which two have been in
Philippines
Concerns:
1. Had the attacker stayed low and slow and out of the
public eye, he could have used Victim1 account at his
discretion for unknown period of time.
2. Prevention tools are necessary, though must be combined
with continuous monitoring for VIP and designated
accounts. Any offshore agent who is savvy enough to
recall customer VIP account password could access even
after they leave Verizon. (Recall AT&T, April 2015)
Bad Actor Calls Rollup
Critical Path: 13 calls from 5/15 to 10/12
Recommendations/Options:
There are 4 confirmed instances where information was given.
1. Having high value info, in least protected environments
remains concern. Tools will assist, though human factor
remains. Thus:
2. RBAC VIPs in US (Segregated WS). Use Higher paid, higher
qual agent. Higher retention.
3. Tools will provide “Prevention” though once “inside” we
pivot to “detection”. Options such as 100% Smart
Auditor/Continuous Monitoring and onsite Security as we
now utilize in certain VES and CMS and Wireless
locations. Video reviewed daily for anomaly and out of
bounds behavior.
4. Immediate response in event of breach is provided.
•
•
•
•
Vendor/Employer breakout
Vendor
• 1 call/1 failure
Vendor
• 1 calls/1 failures  AOL
Breach
Vendor
• 2 calls/1 failure
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or
distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
•
•
•
•
Vendor
• 1 call/1 failure  VZ
Breach
Vendor
• 1 call/ 0 failures
Vendor
• 1 call/0 failures
Verizon
• 6 calls/0 failures
6
Protecting Our House
Historical Approach
Changing Landscape
Insider Threat is a reality in Public and Private Sectors
Softening Perimeter - Demand for remote access
Focus on governance from contract through end of life.
Expanded Geographic Presence
Bring Your Own Device / Mobile Computing
Loss of Intellectual Property
Evolving Security
“Lock the doors and windows”
Understand what “good” looks like and look
for meaningful differences
Environment analysis and base lining
Anomaly detection and response
Big data analytics
Intelligence fusion
Comprehensive Security, Monitoring, Logging and Digital Analytics
Proprietary and Confidential – Not for Disclosure Outside of company
7
Timeline
Prior
to 2006,
the security
of data
assets was
To
address
growing
concerns,
Security
treated
as to
anprovide
‘add-on’enhanced
after the support
businesstowas
expanded
already
in operation.
the business.
Security instituted additional
internal legal, monitoring, and assurance
It was primarily
focused
on preventing
services
which could
address
insider threats
external
attacks
through traditional
site
from
vendors,
contractors
and employees.
monitoring (cameras and badges).
The focus of security was
primarily on the physical
perimeter. Data was protected
by weak controls and was not
treated as a valued asset.
Auditing of the environment
was random and typically in
response to an issue that had
already occurred.
Security assurance was
unsustainable & unpredictable.
Global clearance council
increases focus on offshore
data control and access.
GSOC institutes monitoring
services capable of detecting
malicious activity
internationally.
V&V begins regular reviews of
control effectiveness globally
to provide dedicated and adhoc support to the business
Proprietary and Confidential – Not for Disclosure Outside of company
2002
2004
2006
2008
2010
2012
2014
8
Converged Solution Security
Corporate Security consists of 6 major functional
departments:
Legal Compliance; Domestic Investigations;
Wireless Security; Domestic Physical Security,
Travel Security and Cyber Security
Cyber Security consists of 6 major functional units
under Corporate Security:
Business Risk Team, ISG, GSOC, V&V, Fraud and
Forensics, and Security Technical Support
These combined elements form a converged
solution set, which provides a multi-layered,
worldwide, global security support capability to
company
End to End Business Coverage
Contract
Security
Operational
Incident
Implementation
Pre-Security
Development
Engagement
Response
Launch
Center/Operation
launches
and
security
hasuses
Traditionally,
Legal
Contract
Business
Vendors
When
department’s
a security
are
work
caseselected
security
development
plan,
incident
Global
which
from
teams
isincludes
Clearance
an
detected
includes
are
approved
notsecurity
involved
funding
by
team
the
list
ora/in
day-one
controls-based
baseline
off
of
which
Security
requirements,
the
cost
submitted
V&V
vendor
planning
team
Risk
to
or
sourcing
Profile
the
iffor
isthe
implemented
security
Business
project
in
process.
partnership
requirements
Risk
reports
Aby
Team
project
the
awith
concern,
(BRT)
Project
may
Security
for
measurements,
auditing,
and
reporting
will be
teams
team.
move
evaluation.
the
Investigation
through
to
Security
establish
BRT
its
controls
searches
team
lifecycle
project
provides
are
and
specific
for
built
recent
only
an
into
conditions
appropriate
engage
or
the
pending
performed
collaboratively
by“red-lines”
security
teams.
and
infrastructure
security
litigation,
response
applicable
when
and
relationships
is
as
an
controls
able
the
incident
operation
to with
leverage
andoccurs.
foreign
iscompliance
turned
However,
entities,
up. the
contracts
damage
and several
reports
to
toto
address
the
other
ensure
company
components
root
security
causes.
is already
standards
to determine
done.
are the
present.
risk posed to Verizon by using that vendor.
RFP Vendor Contract Implementatio
n
Selection
VZ
VZ
VZ
VZ
Operational
Launch
VZ
Proprietary and Confidential – Not for Disclosure Outside of company
Incident Response
VZ
10
Architecture of the Insider Threat Program
Audit
AP
Active
Sync
IM
GOOD
USB
DLP
VPN
HR/EEO
Email
Proxy
CITRIX
Partnerships
Domestic
3rd Party Team
Domestic/International
Corporate Policies
Baselines
Environmental
Legal
Best Practice
Proprietary and Confidential – Not for Disclosure Outside of company
Government
11
Cyber capability evolution…Silo to Integrated
Analytics categorizes Secured Digital
issues by type and
Evidence Collection &
severity in order to
Analysis
analyze trends in controlInvestigation Support
Forensics/
FORENSICS
vulnerabilities
based on
2nd Level
Forensics
geography and
/ 2nd
Level
ownership.
Investigate FraudV&V verifies that the
controls defined by a
Allegations
project‟s
governance
Technical Resource
for
exist in the
Legal, HR, Privacy,
FRAUD
implementation space,
etc.
Fraud
Fraud
and validates that those
controls are working
effectively to prevent the
egress of sensitive V&V
information
Corporate
The
results of analysis
Analytics
V&V
Analytics
Security
often allow us to take
corrective measures
STS
GSOC
V&V is able to influence
before a problem occurs.
mitigation strategies by
This has led to an
STS
GSOC
working with project
overall decrease in the
owners to find solutions
number of exposure
Secure Data Storage
Enterprise Network
which will meet their
opportunities as well as Sensitive Application
Content
Inspection
The
capabilities
of
the
Insider
Threat
Program
are
being
deployed
in
operational goals and
stronger compliance with
Development
Cyber Event Analysis
the known high
risk vendors and locations.High Risk User enable the business toGSOC
company
standards.
Maintenance and
STS
function more securely.
Support of Critical
Monitoring
The Program Systems
is not everywhere, and does not cover all locations, or
high risk vendors or environments.
Proprietary and Confidential – Not for Disclosure Outside of company
12
Identifying the Threat
Event log:
Active Directory
2014-03-10:22:01:02
Host Name:
dummyhost
Assigned IP:
127.0.0.1
User:
V123XXX
Event Type:
Type:
Event
Windows Successful
Successful
Windows
Logon:
V123XXX
Logon
Host: dummyhost
MY\Domain
Event log:
Symantec
2014-03-10:22:04:22
Host Name:
dummyhost
User:
V123XXX
Filename:
company_Secret Sauce
Process Name
C:/Windows
company_Secret
Log
files written to
SauceUSB
written
to USB
drive
drive
Event log:
PROXY
2014-03-10:22:06:15
Source IP:
127.0.0.1
User:
V4123XXX
URL:
http://dropbox.com
ACTION:
UPLOAD
Category:
Online Storage
Event log:
Content Inspection
2014-03-10:22:06:16
Source IP:
127.0.0.1
URL:
http://dropbox.com/
Filename:
company_Secret Sauce
File CONTENT:
CONFIDENTIAL
Category Policy:
Confidential
Correlated data creates the bigger picture:
Correlated data
2014-03-10:22:06:20
User:
V4123XXX
Host Name:
dummyhost
URL:
http://dropbox.com/
ACTION:
UPLOAD
Filename:
company_Secret
Sauce
File CONTENT:
company
CONFIDENTIAL
“The whole is greater than the sum of the individual parts.”
Confidential and proprietary materials for authorized company personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
13
V&V: Extending the Security Ecosystem
V&V MISSION
V&V verifies that the controls defined by a project‟s
governance exist in the implementation space, and
validates that those controls are working effectively to
prevent the egress of sensitive information or the
intrusion of unauthorized persons into the network.
V&V‟s directive extends that of the typical audit function
to implement appropriate mitigation responses that will
support the mission of the business.
V&V deploys embedded
regional IST program
managers and operational
personnel in a “tactical
spread” fashion in order to
have proximity and capability
in areas with high volume of
VZ business activities.
Confidential and proprietary materials for authorized company personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
14
Primary Responsibilities & Capabilities
Proprietary and Confidential – Not for Disclosure Outside of company
15
Performance Indicators
• Significant year to year increase in global security reviews
• Overall reduction in all categories of findings
• Reduction in severe findings globally
• Higher rate of sustainable compliance
• Significant reduction in mean time to repair (MTTR)
• Predictable Security Posture when adopting appropriate and measurable controls
Building a more security conscious culture
Confidential and proprietary materials for authorized company personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
16
Improvement – 2012-2014
When Corpsec engages with a Tier 1 model of support,
there is substantive and sustainable cyber and physical
“controls” improvement
1.
2.
3.
4.
5.
Reviews increase due to targeted usage. Includes all aspects
of security which could impact business globally
Findings have mandatory response requirements based on
severity
Findings initially spike, then level off over time
Both MTTR and OTR (On time Resolution) improve due to
process adoption over time
Importantly, findings “Severity” decreases categorically and
in volume, as business becomes accustomed to security
“norms”
Proprietary and Confidential – Not for Disclosure Outside of company
17
Insider Risk Reporting
New vendor
engagement
Confidential and proprietary materials for authorized company personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
18
Program Evolution
The Corporate Security Insider Threat Program (ITP) began in its current form in 2010 with the addition of
the V&V program. The program shifted from silos to an integrated framework based on the 13 traditional
U.S.CERT elements of a formal ITP.
Sub-Category
VZ Corporate
Security
(1)
Initial
Planning
(2)
Identify
Stakeholders
x
x
(3)
Achieve &
Sustain
Leadership
Buy-in
(4)
Risk
Management
Process
(5)
Detailed
Project
Planning
(6)
Governance
Structure,
Policies &
Procedures
(7)
(8)
(9)
Communication, Establish Data & Tool
Training &
Detection Requirements
Awareness
Indicators
x
(10)
Data
Fusion
(11)
Analysis &
Incident
Management
x
x
(12)
(13)
Management Feedback &
Reporting
Lessons
Learned
x
x
When the ITP is engaged, especially in environments that have not gone through the traditional clearance
process, we see immediate evidence of non-compliance in all categories.
As the ITP is embedded with the business and matures, we see sustainable categorical improvements,
severity of issues decrease or level off and business response to issues improves:
• Global finding to review ratio decreased 30%. On-time resolution of findings increased by 32%
• Occurrence of severe issues reduced from common to rare
• Mean time to resolve issues dropped below target from a peak average of 70 days to an average of
2.3 days. Occurrence of top four categorical finding types continues to decline
Proprietary and Confidential – Not for Disclosure Outside of company
19
Missteps which lead to Insider Threat
•
Assuming that Serious Insider Problems are in someone else‟s organization
•
Disproportionate reliance on background checks, policy or contracts, assuming these will
care for potential concerns.
•
Assuming that indicators will be interpreted properly…or assuming that all environments
have indicators to interpret.
•
Relying solely on periodic quality checks, or assuming that Cyber Security Rules are
followed because of vendor agreements.
•
Assuming employees or vendors are aware and savvy around security controls
•
Assuming that only intentional actions will cause damage
•
Relying on a heavy, reactive response capability in lieu of an integrated, preventative
programmatic approach.
•
Not knowing the security posture of day to day activities in international vendor
environments
Proprietary and Confidential – Not for Disclosure Outside of company
20
WRAP-UP
PTEXXXXX XX/14
Confidential and proprietary materials for authorized company personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Download