Taxonomy-of-Cyber-Remediation-Tools (2)

advertisement
White Paper:
Cyber Response Solutions: A taxonomy of response,
recovery, restoration and remediation tools
Not all response tools are the same
Inside:
 Know the response tool market
 Identify your technology needs
 Refine your requirements
1
About This Paper
The National Institute of Standards and Technology (NIST), working collaboratively
across a broad range of stakeholders, released a Cybersecurity Framework in February
2014. This framework, based on the functions of Protect, Detect and Response, has
been adopted as a common model for actions for highly performing cyber security
operations.
The response portion of the cybersecurity framework is the topic of this white paper.
Specifically, this paper focuses on a taxonomy of capabilities and the technologies that
can assist enterprises in the response function.
About The Authors
The primary authors of this paper, Bob Flores, Bob Gourley and Roger Hockenberry,
are all experienced enterprise Chief Technology Officers and technology executives
with extensive design experience. They leveraged this experience in interviews with
technology executives in government and commercial enterprises and engineers at both
Intel and Cloudera to produce the mission focused design tips presented in this paper.
Sources and Methods
After a detailed review of the NIST Cybersecurity Framework and associated
references, we examined over 200 firms in the cybersecurity space. To find these firms
we surveyed the portfolios of Venture Capital firms, reviewed the sponsors, attendees,
and speakers at major cybersecurity tradeshows and expos (like RSA, Black Hat, and
our own FedCyber conference), and surveyed sponsors and product directories of
major cybersecurity periodicals (Security Magazine, SC Magazine, InfosecurityMagazine). We then created a master list of all firms with capabilities relevant to
enterprise cybersecurity response and categorized them by which sub area of this field
they operate in.
The resulting taxonomy and critical requirements in each category are provided below.
2
The NIST Cybersecurity Framework
In response to a Presidential Executive Order, NIST embarked on a yearlong activity
collaborating across multiple sectors of industry, academia and government to collect
best practices in enterprise cybersecurity and then codify them in an executable
framework. The first iteration of this framework was published in February 2014.
The framework focuses on using business drivers to guide cybersecurity activities, and
is at its heart an outline of management best practices. However, it is also an important
organizing guide for technologists, since every business-focused capability in the
framework can be achieved by technology.
The five key functions of the core NIST framework are





Identify: Foundational enterprise awareness
Protect: Safeguards to enhance Confidentiality, Integrity, Availability
Detect: Appropriate activities to identify the occurrence of a cybersecurity event
Respond: Activities to take action regarding detected events
Recover: The restoration of functions to normal operation after events
Response
The response function is of increasing importance to the modern enterprise and is a
critical component of the NIST cybersecurity framework. NIST articulates this as
“appropriate activities to take action on regarding a detected cybersecurity event.”
Response activities include for response planning, communications and collaboration
during an event, analysis of event data, and mitigation/removal of malware.
This paper will focus on the enabling technologies involved in automating the response
activity and can be used as a guide to help decision-makers better understand options
and opportunities that exist in the marketplace.
Automating Response
The concept of enhanced automation for security has taken off like wildfire in the
enterprise security community. For a decade we have all been collectively working
towards better ways to automate continuous monitoring of our IT infrastructure. Now the
conversation around the concept is shifting towards continuous remediation, including
3
the automatic removal of malicious code. Automated engagement and removal are now
seen as the only way to keep up with adversaries that have automated their attacks.
Taxonomy of Response Capabilities
The NIST framework categorization of response activities provides a solid taxonomy for
the categories of technologies that can aid in response. These categories include:
Category
Response
Planning
Description
Technologies that contribute to the creation, maintenance and
execution of plans and policies for response. This includes
technologies that contribute to response rehearsal and response
training.
Communications Technologies that are designed to ensure uninterrupted
and
communication during cyber events, both with internal and external
Collaboration
stakeholders. Information sharing tools are included in this
category. This includes communication of forensics data to law
enforcement as required. Technologies that enable and enhance
the collaboration between and among members of response teams
internally and externally as required.
Analysis
Technologies that contribute to analysis of data in a timely enough
way to contribute to event response actions. Includes technologies
that contribute to notifications from detection systems for analysis.
Includes technologies that contribute to the ability to conduct rapid
analysis over large data sets.
Mitigation
Technologies that contribute to event containment, the reduction in
what adversaries are able to do and the limiting of damage. Also
technologies that identify new vulnerabilities and automatically
remediate them.
Removal of
Technologies that automate the identification of and removal of
Malware
malicious code including rootkits, bots, self-propagating code, in
memory code or any executables.
A Market Survey: Technologies categorized by response
capabilities
Our survey of over 200 technology firms provides actionable context for enterprise CTO
and CISOs seeking to meet key response mission needs. Below is a categorization of
4
key firms we found based on their function and ability to support various components of
the response taxonomy.
Category
Response
Planning
Communications
and
Collaboration









Analysis










Mitigation


Removal of
Malware

Representative Technologies
Acuity: Enterprise governance risk and compliance tools.
AlgoSec: Security policy management for the enterprise.
MetaCompliance: Compliance management software.
PhishMe: Training and education and response preps
around Phishing attacks.
Akamai: Very reliable communications, content distribution
and the ability to weather DDoS attacks
AlephCloud: Secure collaborative environment and cloud
tools
Cisco: Collaboration tools and end to end comms
CyberIQ: Collaborate over incidents and data.
Gigamon: Know the status of networks and data flows.
AccelOps: Analytics driven IT operations management
Adallom: Monitor and analyze cloud and other services
BeyondTrust: Known for scanners and account
management and analysis
LogRhythm: SIEM and analysis
Norse: Correlate and analyze across broad networks
Plixer: Netflow and analysis
Rapid7: Scan, correlate and analyze
Splunk: Machine data. Search. Analytical tool.
Tenable: Software and hardware for gathering and analysis
Hexis Cyber Solutions: Analysis over network data
Mandiant: Agents enable detection and human response
Hexis Cyber Solutions: Human guided or pre-planned
response
Hexis Cyber Solutions: Proven ability to remove malware
of all types anywhere in the enterprise
Planning Guidance
As a decision-maker in the enterprise, executives should conclude that no one product
has the ability to fully automate response for cyber incidents or threats and that a
5
deliberate approach to integrate several capabilities will lead to a stronger readiness
posture to meet threats before, and as they occur.
The key in the response matrix and taxonomy is to quickly contain, and react to an
incident in near real-time while also allowing for the forensic analysis after an event to
ensure that full impact and down stream effects can be calculated and remediated if
necessary.
A review of the capabilities above provides insights into what the market has to offer
and can inform enterprise decision-makers on what they should be requesting as
capabilities for their enterprise. This assertion allows us to articulate key requirements
for technologies in each of these categories that we believe enterprise technologists
should consider.
Category
Response
Planning




Communications
and
Collaboration

Analysis

Mitigation


Removal of
Malware


Key Capabilities For Enterprise Response
Field technologies that enable executive and technology
leadership to establish and execute policies.
Ensure interoperability with legacy systems.
Ensure automated testing of response across spectrum of
threat actions
Seek technologies that can automate policy implementation
(important at response time).
Ensure enterprise communications are resilient and plan for
use of backup solutions in case primary nets are down.
Establish collaborative environments for response teams to
work internal and means to collaborate external to the
enterprise.
Important to field technologies that can make use of both
internal and external data for full spectrum analysis.
Ensure you have architected to retain all relevant data
Integrated family of products and services to ensure
mitigation is key. Automated mitigation, sometimes human
guided and when policy allows totally automated
The automated removal of malicious code, including rootkits,
bots, any executable, any malware, is a critical requirement.
In looking at these key areas, the decision-maker should be aware that interoperability
is the key factor to consider and we recommend that an enterprise undertake a small
proof-of-concept to ensure efficacy and scale while building the necessary
competencies to run these types of solutions for the Enterprise.
6
Concluding Thoughts
The NIST framework provides useful guidance for enterprises to plan responses. As
shown here, it also helps when planning for your technology implementation.
The taxonomy of response tools we provide here, Planning, Communications and
Collaboration, Analysis, Mitigation and Malware Removal, flow from the NIST
cybersecurity framework. The taxonomy provides a useful way to think about your
response technologies. If your organization is not automating in any particular area
above there is a good chance you are sub-optimizing your response.
It is especially important to consider the technologies you are putting in place for
automated threat mitigation and automated malware removal. If you are not automating
these actions, then your adversaries have a significant leg advantage.
Malware, viruses and threats can be detected, understood and remediated in near real
time before data exfiltration, making incident response teams more effective and
allowing them to focus on more pressing issues. Use of integrated platforms to
aggregate and use data from existing digital infrastructure is a best practice that
reduces cost, making this a particularly virtuous approach.
A critical success criteria for any security solution: You should architect for
automated removal of malware.
7
More Reading
For more federal technology and policy issues visit:
• CTOvision.com- A blog for enterprise technologists with a special focus on Big Data.
• CTOlabs.com - A reference for research and reporting on all IT issues.
• J.mp/ctonews - Sign up for the government technology newsletters including the Government
Big Data Weekly.
About the Authors
Bob Flores is a co-founder and partner at Cognitio. Bob spent 31 years at the Central Intelligence
Agency. While at CIA, Bob held varous positions in the Directorate of Intelligence, Directorate of
Support, and the National Clandestine Service. He was the agency’s Chief Technology Officer. Bob
serves on numerous government and industry advisory boards
Bob Gourley is a co-founder of Cognitio and editor and chief of CTOvision.com He is a former
federal CTO. His career included service in operational intelligence centers around the globe where
his focus was operational all source intelligence analysis. He was the first director of intelligence at
DoD’s Joint Task Force for Computer Network Defense, served as director of technology for a
division of Northrop Grumman and spent three years as the CTO of the Defense Intelligence Agency.
Bob serves on numerous government and industry advisory boards.
Roger Hockenberry is a co-founder and partner at Cognitio. Following a two-decade career in
industry — first as a technology consultant and later as a management consultant and Managing
Partner at Gartner — Roger took a four-year detour into government service in the intelligence
community where he was charged with driving the realization of the vision he had helped craft as a
consultant.
For More Information
If you have questions or would like to discuss this report, please contact me. As an advocate for
better IT use in enterprises I am committed to keeping this dialogue up open on technologies,
processes and best practices that will keep us all continually improving our capabilities and
ability to support organizational missions.
Contact:
Bob Gourley
bob.gourley@cognitiocorp.com
© August 2014
CTOlabs.com
8
Download