Uploaded by christine.a.meier

Strategies for integrating your cyber security and IT service management process and systems

advertisement
Strategies for
Integrating Your
Cyber Security and IT
Service Management
Process and Systems
Prepared by:
John Bilinski
ITSM Tools Architect
G2SF
8/21/2018
Cyber Threat Analysis and Reporting Today
• 69,000 Cyber reports per year
• Manual sifting of intelligence and
incident reporting to identify
impacts on devices, systems,
networks, or services
• 80% of available time and
manpower is spent to associate
specific threat, vulnerability, or
technical indication of malicious
activity to a specific device or
endpoint that supports system,
network, or services to include
identify system owner, location, and
support organization.
2
The Problem
Experts are unable to prioritize cyber defense activities due to an incomplete
understanding of risk.
Organizations try to defend their
key cyber terrain against threats
targeting their network
Net defenders can’t calculate risk
due to incomplete insights about
the intersection of assets, threats,
and vulnerabilities
Data from threat analysts,
information assurance, and IT
management is not correlated
3
Correlation Challenges between Threats and
Infrastructure Data
The Elephant in the room facing most security organizations is the ability to
correlate threat information in real time with asset and configuration data to
provide actionable cyber intelligence.
4
Bridging the Gap
• Security professionals require:
 Complete understanding of IT
Infrastructure to determine risks
 Efficient ways to correlate threat
information with organizationspecific information regarding the
infrastructure, the assets within the
infrastructure, their location,
vulnerabilities and associated
ownership
• A well defined CMDB contains this
information
Bridging the gap between Security Threats
and Infrastructure data using the CMDB
5
Why the CMDB Fills the Gap?
What is on the network, what offline, what is in inventory?
Where are my assets?
Who is using the asset?
Who supports the asset?
Who owns the asset?
When does maintenance expire?
Where is the contract for the Asset?
*User Managed Data
Discovered Data
Hardware &
Software
Contracts
Computer System
Configuration Items (CIs)
License
Certificates
User Managed
Asset Data*
CMDB
CPUs
Operating
Systems
Software
Products
Organizations
& UIC Data
People
(Active Directory)
6
The Ideal End State
SOLUTION
Automate the manual, time-consuming tasks to correlate threat intelligence,
information assurance, and IT management data to accelerate decisions and actions.
1
2
3
4
OBSERVE
ORIENT
DECIDE
ACT
Automate the discovery
and collection of cyber
intelligence and reports
Automate the collection
of information about
targeted assets/systems
Prioritize decision
making and identify
effective mitigations
Orchestrate the creation,
testing, and deployment
of countermeasures
7
An Integrated Enterprise Cyber Threat Analysis
Solution
• Cybersecurity and Service Management professionals should work together to
automate the manual and time intensive process of correlating threat information
with an organization’s asset information by developing interfaces between the
Configuration Management Data Base (CMDB), ITSM tool suites, and the cyber
security tool suite.
• By building an interface between the CMDB, discovery, ITSM tools, and a threat
intelligence platform, security professionals are able to automatically obtain, ingest,
parse and extract actionable information from cyber intelligence and incident
reporting, and then correlate this information with the data maintained within the
organization’s CMDB.
• This capability significantly enhances the cybersecurity professional’s ability to
calculate mission risk and determine vulnerability exposure and then act more
expeditiously.
8
Phase I – CMDB Common Data Model to
Include Security Specific Attributes
• An Enterprise Common Data Model contains CI definitions and provides appropriate policy and
direction regarding the types of CIs to be included or excluded from the CMDB
• The objective is to maintain a balance between providing relevant CIs and CI information necessary
to ensure maximum service availability.
• The level of detail must be balanced to ensure that you are capturing data that is of value while
filtering out the noise that may create CI maintenance challenges
• What is needed to support security operations in the CDM
1. Ensure that each configuration item type is properly identified and represented with the base
class and attributes necessary to perform security operations
2. For each CI type identify common attributes and unique attributes for specific CI Data that is
provided from your threat and vulnerability detection systems.
9
Step II – Integrating with External Data Sources
• Integration adaptors are used to retrieve data from external
discovery and scanning tools, transform source data into
data that can be used by the CMDB, and populate source
data into defined datasets in the CMDB
• Basic Steps necessary to populate the CMDB with external
data
1. Review the data source’s database table and view
structure and build the desired database queries.
2. Build scripts and transformations that will retrieve the
data and populate the Atrium CMDB.
3. Load the external data into staging dataset in the CMDB
and analyze the data
10
Step III – Normalizing and Reconciling Data
• Normalization is used to merge
discovered data with non-discovered
data and to promote the data to the
production data set.
• Reconciliation is used to flag data
changes and ensure no duplication of
data.
• The Reconciliation Process identifies the
Discovered and Scanned CI Data and
relates to the Production CI by matching
the unique identifier
• The process then appends/merges the
Production CI record with the additional
attributes of the discovered/scanned
data.
11
Step IV Service Dependency Mapping
• Discovery is a critical part of any enterprise
CMDB
• Discovery and Service Dependency Mapping
provides a visual map of all CI that are used in
the delivery of a service
• Data contained in a Service Dependency Map
provides Security and Cyber Operations
professional insight to the possible impacts of
threats and vulnerabilities could have on the
Security Posture of an organizations network
or critical business services
12
Integration of Tools to Determine Vulnerability
Exposure and Calculate Mission Risk
# 1 – Threat Assessment
Data integrated with asset
and configuration
management information
in the CMDB
Incident
Ma na gement
Threa t
Assessment
Da ta ba se
Problem
Ma na gement
CMDB
# 5 – Mitigation tasks tracked
in ITSM system through
incident, change, and
problem tickets
# 4 – Risk Assessment and
Security Posture determined
based on threat identification
then mitigation tasks
identified.
Cha nge
Ma na gement
# 2 – Continual discovery
of asset and configuration
data reconciled into the
CMDB
Example Discovery Tools
§
§
§
§
Example Security Scanning
Tools
§
§
§
§
De c ision Support
through Da shboa rd,
Reporting a nd
Ana lytic s
BMC Discovery
Universal Discovery
SCCM
Tanium
Tenable
ACAS
Intrusion Detection
Virus Scanning
# 3 –Threat Assessment Data and
CMDB Data correlated and analyzed
for comprehensive threat
identification.
13
Benefits of an Integrated Solution
•
•
•
•
•
•
•
•
•
Reducing the time that analysts spend discovering, collecting, and vetting Indicators of Compromise
(IOC) reporting information.
Enabling analysts to identify the relationships between cyber intelligence and potential Configuration
Items (CIs) within the CMDB that might be impacted by a reported threat.
Isolating which CIs and systems have configurations that are at risk of exploitation and the impact to
services in support of the mission.
Increasing the time analysts spend investigating, understanding, planning and prioritizing threat
defenses and risk management activities.
Allowing analysts to spend more time determining the operational impact of malicious cyber activity
on targeted CIs and executing threat mitigation and risk management activities.
Reducing the turnaround time between cyber event reporting and execution of mitigation activities
that prevent a security breach or service disruption.
Tracking the number and types of assets that are vulnerable to threats as systems are patched.
Identifying the last security scan and security patch date of all assets.
Increasing visibility regarding the full impact of vulnerabilities by identifying risk exposure of assets
that are:
–
–
–
Deployed within the protected enclave and/or exposed to the Internet
On the shelf in inventory, but not deployed
Mobile assets that are known to be deployed, but not currently visible on the network
14
Please complete
your session
evaluation in the
FUSION app.
Session #:
Download