Joint Written Project (JWP) Assignment Automating Crosswalk between SP 800, the 20 Critical Controls, and the Australian Government Defence Signals Directorate’s 35 Mitigating Strategies GIAC Enterprises Authors: Ahmed Abdel-Aziz Robert Sorensen February 2012 Automating Crosswalk between SP 800 and the 20 Critical Controls 2 Table of Contents 1. EXECUTIVE SUMMARY ...................................................................................................................... 3 2. INTRODUCTION .................................................................................................................................... 4 3. RELATIONSHIP BETWEEN SP 800, 20 CRITICAL CONTROLS, AND THE AUSTRALIAN GOVERNMENT DSD’S 35 MITIGATING STRATEGIES .................................................................... 5 3.1 SP 800 ................................................................................................................................................. 5 3.2 20 CRITICAL SECURITY CONTROLS ...................................................................................................... 5 3.3 AUSTRALIAN GOVERNMENT DEFENCE SIGNALS DIRECTORATE’S 35 MITIGATING STRATEGIES ......... 8 4. DEVELOPING APT-FOCUSED SECURITY GUIDANCE STRATEGY ......................................... 8 4.1 ADVANCED PERSISTENT THREATS (APTS) ........................................................................................... 8 4.2 RISK-BASED APPROACH ...................................................................................................................... 9 5. AUTOMATION APPROACH FOR CRITICAL CONTROLS 15 AND 17 ......................................12 5.1 EXPLOITING THE ABSENCE OF CRITICAL CONTROLS 15 AND 17 ..........................................................12 5.2 FOCUSING ON THE DATA .....................................................................................................................12 5.3 ESTABLISHING A RISK-BASED DLP PROGRAM ....................................................................................13 5.4 AUTOMATING DATA CLASSIFICATION AND POLICY DEFINITION .........................................................14 5.5 AUTOMATING THE CONTROL OF DATA-IN-MOTION ............................................................................16 5.6 AUTOMATING THE CONTROL OF DATA-AT-REST/DATA-IN-USE ..........................................................18 6. AUTOMATION APPROACH FOR CRITICAL CONTROLS 4 AND 5 ..........................................22 6.1 EXPLOITING THE ABSENCE OF CRITICAL CONTROLS 4 AND 5 ..............................................................24 6.2 FOCUSING ON THE APTS, AND THE THREAT VECTORS THROUGH CONTINUOUS MONITORING ..........24 6.3 CONTROL 4 - AUTOMATING CONTINUOUS VULNERABILITY ASSESSMENT AND REMEDIATION ..........26 6.4 CONTROL 5 - AUTOMATING CONTINUOUS MONITORING OF MALICIOUS SOFTWARE AND MALWARE CALLBACKS. ..............................................................................................................................................30 7. RECOMMENDED RISK-BASED ACTION PLAN ............................................................................33 8. REFERENCES ........................................................................................................................................35 9. APPENDIX ..............................................................................................................................................40 APPENDIX A: FIPS PUB 200 - SPECIFICATIONS FOR MINIMUM SECURITY REQUIREMENTS .....................40 APPENDIX B: MAPPING BETWEEN THE 20 CRITICAL SECURITY CONTROLS AND NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY SPECIAL PUBLICATION 800-53, REVISION 3, PRIORITY 1 ITEMS .............44 APPENDIX C: MAPPING BETWEEN THE 20 CRITICAL SECURITY CONTROLS AND THE AUSTRALIAN GOVERNMENT DEFENCE SIGNALS DIRECTORATE’S 35 MITIGATION STRATEGIES .....................................46 Automating Crosswalk between SP 800 and the 20 Critical Controls 3 1. Executive Summary GIAC Enterprises is a small to medium sized growing business (1,000 employees) with two data centers and 200 people in central business and IT. The GIAC Enterprises Fortune Cookie sayings are a closely guarded secret and have come under attack from competitors in the past. Recently, a security expert from a respected consultancy gave a briefing on a topic titled, “Operation Shady RAT,” that outlined a scenario where many corporations and government organizations were compromised routinely over a period of five years (Alperovitch, 2011). This has prompted our organization to examine key security investments, come up with sound advice regarding security strategy, and how to implement that strategy. In making this recommendation, we reached out for guidance included in widely recognized information security frameworks. Our analysis showed SANS’ Consensus Audit Guidelines (CAG) reinforces and prioritizes some of the important elements put forth in U.S. government documentation such as NIST SP 800-53. Furthermore, portions of the CAG are reinforced by the Australian Government Defence Signals Directorate’s (DSD) 35 strategies to mitigate targeted cyber intrusions. After reviewing the direct mapping between the 20 critical controls and NIST SP 800-53, and DSD’s 35 strategies, we adopted a security guidance strategy that is based on or designed to counter Advanced Persistent Threats (APTs). APTs currently pose significant risks to GIAC Enterprises, and it is likely the situation will stay that way for the foreseeable future. Therefore, our risk-based security guidance strategy is information focused and gives special attention to four security controls, which are geared well for attacks with APT characteristics. The four security controls are: 1) Controlled Access based on the Need-to-Know; 2) Continuous Vulnerability Assessment and Remediation; 3) Malware Defenses; and 4) Data Loss Prevention (DLP). We have devised automation approaches for these four controls to facilitate implementing them. We argue that more attention is needed to secure the data, and have proposed a model for a DLP program. Therefore, we have developed an automation approach for data classification and DLP policy definition. This was followed by automation approaches to control data-in-motion, data-at-rest, and data-in-use. We knew that for an attack to succeed, it will need to exploit a vulnerability. That is why we also focused on reducing our attack surface by developing an automation approach for continuous vulnerability assessment and remediation, as well as malware defenses. Finally, our research ends with a recommended action plan for GIAC Enterprises. The objective of this action plan is to take the organization from its current security state, to the desired security state, in a step-by-step fashion. Automating Crosswalk between SP 800 and the 20 Critical Controls 4 2. Introduction Advanced Persistent Threats (APTs) (Andress, 2011)! Operation Shady RAT (Lau, 2011)! These are terms or references that just a few years ago would not have raised an eyebrow. Today, they are well known and often overused buzzwords. However, that does not change the nature of the threat that they have exposed. From the highly visible case of “Operation Aurora,” where Google, Adobe, and dozens of other companies came under attack in 2009 and 2010 from sources believed to be in China (McClure, 2010), to the sophistication and stealth of the compromise of RSA intellectual property (Coviello, 2011), major corporations have come under attack. What is to prevent your enterprise from suffering the same fate? As reported in the Second Qualys annual report, modern-day attackers employ organized, well written, and highly sophisticated exploit code to do their deeds (Dausin, 2010). To assist in counteracting the many assaults, one needs to take proactive steps to manage risk and exposure. Guidance to help mitigate this risk has been provided as a result of multiple initiatives. Examples of such initiatives are: Federal Information Security Management Act (FISMA), the 20 Critical Security Controls, and the Australian Government Defence Signals Directorate’s (DSD) 35 Mitigating Strategies. An informative explanation follows to describe the relationship and synergy between these specific three initiatives. In an effort to maximize the benefit of these initiatives with minimal resources, one must target a subset of controls to initially implement. This idea of initially targeting a subset of controls was proven successful by the Australian DSD, which will be covered in more detail. This research is based on a similar targeting approach; however, the subset of controls selected is a subset of the 20 Critical Controls. The development of a security guidance strategy for GIAC Enterprises, as well as automation approaches for that strategy will be explored in detail. Automating Crosswalk between SP 800 and the 20 Critical Controls 5 3. Relationship between SP 800, 20 Critical Controls, and the Australian Government DSD’s 35 Mitigating Strategies 3.1 SP 800 Title III of the E-Government Act of 2002 (P.L. 107-347), authorized the Federal Information Security Management Act (FISMA), was designed to strengthen information security government wide (E-Government Act of 2002). The National Institute of Standards and Technology (NIST) was tasked to develop, document, and implement an organization-wide program to provide security for the information systems that support its operations and assets. The result was the establishment of the FISMA Implementation Project in January 2003 (FISMA Implementation Project, 2009). One of the key publications that came from this effort is SP 800-53 - Recommended Security Controls for Federal Information Systems and Organizations (SP 800-53 Revision 3, 2010). This is designed to cover the steps in the Risk Management Framework that address security control selection for federal information systems in accordance with the security requirements in Federal Information Processing Standard (FIPS) 200. This standard specifies the minimum security requirements in seventeen security-related areas and all federal agencies must be in compliance with this standard (FIPS PUB 200, 2006, p. v). There are specifications outlined for the minimum security requirements which can be found in Appendix A: FIPS PUB 200 - Specifications for Minimum Security Requirements (FIPS PUB 200, 2006, p. 2-4). As noted, SP 800-53 is currently in its third revision. It will continue to be updated to reflect the current state of information security to include guidance concerning insider threats; software application security; social networking; mobile devices; cloud computing; cross domain solutions; advanced persistent threat; supply chain security; Industrial/process control systems; and privacy (Smith, 2011). 3.2 20 Critical Security Controls In early 2008, as a response to the extreme data losses experienced by leading companies in the U.S. defense industrial base, a consortium of federal agencies and Automating Crosswalk between SP 800 and the 20 Critical Controls 6 private organizations developed Version 1.0 of the Consensus Audit Guidelines that define the most critical security controls to protect federal and contractor information and information systems (Baseline Standard of Due Care for Cybersecurity, 2009). This effort has continued to evolve, and the 20 Critical Security Controls, Version 3.1, was released in October 2011 (Consensus Audit Guidelines Version 3.1, 2011). The effectiveness of this document is based on the knowledge of actual attacks and the defensive techniques that are most important to counteract them. Contributors include (CAG, 2011, p. 8): Consensus Audit Guidelines Contributors 1) Blue team members inside the Department of Defense (DoD) who are often called in when military commanders find their systems have been compromised and who perform initial incident response services on impacted systems. 2) Blue team members who provide services for non-DoD government agencies that identify prior intrusions while conducting vulnerability assessment activities. 3) US Computer Emergency Readiness Team staff and other nonmilitary incident response employees and consultants who are called upon by civilian agencies and companies to identify the most likely method by which systems and networks have been compromised. 4) Military investigators who fight cyber crime. 5) The FBI and other law enforcement organizations that investigate cyber crime. 6) Cybersecurity experts at US Department of Energy laboratories and federally funded research and development centers. 7) DoD and private forensics experts who analyze computers that have been infected to determine how the attackers penetrated the systems and what they did subsequently. 8) Red team members inside the DoD tasked with finding ways of circumventing military cyber defenses during their exercises. 9) Civilian penetration testers who test civilian government and commercial systems to determine how they can be penetrated, with the goal of better understanding risk and implementing better defenses. 10) Federal CIOs and CISOs who have intimate knowledge of cyber attacks. The 20 Critical Controls include 15 controls that can be continuously monitored and validated at least in part in an automated manner and five that must be validated manually (CAG, 2011, p. 9-10). Critical Controls subject to automated collection, measurement, and validation: 1) Inventory of Authorized and Unauthorized Devices 2) Inventory of Authorized and Unauthorized Software 3) Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers Automating Crosswalk between SP 800 and the 20 Critical Controls 7 4) 5) 6) 7) 8) 9) Continuous Vulnerability Assessment and Remediation Malware Defenses Application Software Security Wireless Device Control Data Recovery Capability (validated manually) Security Skills Assessment and Appropriate Training to Fill Gaps (validated manually) 10) Secure Configurations for Network Devices such as Firewalls, Routers, and Switches 11) Limitation and Control of Network Ports, Protocols, and Services 12) Controlled Use of Administrative Privileges 13) Boundary Defense 14) Maintenance, Monitoring, and Analysis of Security Audit Logs 15) Controlled Access Based on the Need to Know 16) Account Monitoring and Control 17) Data Loss Prevention 18) Incident Response Capability (validated manually) 19) Secure Network Engineering (validated manually) 20) Penetration Tests and Red Team Exercises (validated manually) As described in the document, there is a direct relationship to the U.S. Federal Guidelines: The 20 Critical Controls are meant to reinforce and prioritize some of the most important elements of the guidelines, standards, and requirements put forth in other US government documentation, such as NIST Special Publication 800-53, SCAP, FDCC, FISMA, manageable network plans, and Department of Homeland Security software assurance documents. These guidelines do not conflict with such recommendations. In fact, the guidelines set forth are a proper subset of the recommendations of NIST Special Publication 800-53, designed so that organizations can focus on a specific set of actions associated with current threats and computer attacks they face every day (CAG, 2011, p. 12). The direct mapping between the 20 Critical Security Controls and NIST Special Publication 800-53, Revision 3, Priority 1 items can be found in Appendix B. The U.K. Centre for the Protection of National Infrastructure (CPNI) recently released a new guidance document detailing the Top Twenty Critical Security Controls. These provide a baseline of high-priority information security measures and controls that can be applied across an organization in order to improve its cyber defense. CPNI is participating in an international government-industry effort to promote the top twenty Automating Crosswalk between SP 800 and the 20 Critical Controls 8 critical controls for computer and network security which is being coordinated by the SANS Institute (Continuity Central, 2012). 3.3 Australian Government Defence Signals Directorate’s 35 Mitigating Strategies In 2010, the Australian Defence Signals Directorate (DSD) developed a list of 35 prioritized mitigation strategies to defend networks and systems from cyber attack based on the study of all known targeted intrusions against government systems, and articulated what would have stopped the infections from spreading. The DSD updated and reprioritized this list in 2011 and determined that at least 85% of the targeted cyber intrusions could have been prevented by following the top four mitigation strategies. Because of this ground-breaking directive of focusing on the top four controls and implementing them, they received the 2011 U.S. National Cybersecurity Innovation Award (SANS Press Release, 2011). The top four specific controls (nicknamed the “sweet spot”) are: 1) Patch applications such as PDF readers, Microsoft Office, Java, Flash Player and web browsers; 2) Patch operating system vulnerabilities; 3) Minimize the number of users with administrative privileges; and 4) Use application whitelisting to help prevent malicious software and other unapproved programs from running. The DSD’s 35 Mitigating Strategies focus on individual tasks organizations can undertake to improve their security stance. They are a focused subset of the 20 Critical Controls with a direct mapping detailed in Appendix C: Mapping between the 20 Critical Security Controls and the Australian Government Defense Signals Directorate’s 35 Mitigation Strategies (CAG, 2011, pp. 72-75). 4. Developing APT-focused Security Guidance Strategy 4.1 Advanced Persistent Threats (APTs) In the past few years, intelligence agencies and computer security vendors have begun using the term Advanced Persistent Threats (APTs) to describe a series of cyberbased attacks. The term, APTs, typically describes a foreign nation state government with the advanced capability and persistence to commit cyber espionage (Binde, 2011). Automating Crosswalk between SP 800 and the 20 Critical Controls 9 Publicly, we have seen a majority of companies in every industry deal with significant and costly attack vectors. In January 2010, the source code and intellectual property of Google and at least 20 other companies in the high-tech industry and defense industrial base were targeted and compromised during “Operation Aurora” (McClure, 2010). In November 2009, “Operation Night Dragon” included a series of coordinated and targeted attacks against the global oil and gas companies (Shook, 2011). Most recently, in the “Operation Shady RAT" described attack, around 70 corporations and government organizations were compromised routinely over a period of 5 years (Alperovitch, 2011). The above attacks included several commonalities. Routinely, the attackers used previously unknown attack vectors known as zero-day attacks. Unsuspecting users opening email attachments or browsing malicious websites introduced these attacks into the victim network. Additionally, all of these attacks relied upon a remote command and control channel to steal the data out of the infected networks. In most cases, the victims compromised were eventually discovered only after virus researchers discovered the attacker’s command and control servers (Command, 2011). 4.2 Risk-based Approach From SANS’ point of view, focusing on the 20 Critical Controls will help an organization be prepared for the most important actual threats that exist in today’s world. The 20 Critical Controls help organizations make better use of their limited security resources, by using a prioritized set of overarching security controls. GIAC Enterprises will highly benefit from fully adopting the 20 Critical Controls; however, fully adopting these Critical Controls will take considerable time. Therefore, we argue that GIAC Enterprises would benefit most if it takes a riskbased approach to initially implement only a subset of the 20 Critical Controls that address its highest risks first. Afterwards, the remaining 20 Critical Controls can be implemented. It is our belief that due to the nature of GIAC Enterprises’ business, and being the world’s largest supplier of Fortune Cookie sayings, its intellectual property is a target for theft. This makes APTs-related risks the highest at this point of time for GIAC Enterprises. The initial focus should be on mitigating such risks. The next step of the strategy is to apply the “offense-informs-defense” concept to determine which subset of Automating Crosswalk between SP 800 and the 20 Critical Controls 10 controls is better geared to mitigate APTs-related risks. To determine the appropriate subset of controls, one would highly benefit from tapping in to the collective experience of the 20 Critical Controls’ contributors, who are responsible for responding to actual attacks or conducting red team exercises (CAG, 2011, pp. 8-9). Based on the contributors’ first-hand knowledge of real world attacks and associated defenses, the contributors included a table of attacks mapped to the most directly related control. That table represents the foundation for selecting a subset of controls, which is based on the “offense-informs-defense” concept. Reviewing the Attack Types table included in the 20 Critical Controls Consensus Audit Guidelines’ Appendix (CAG, 2011, pp. 76-77), it is clear that four attacks stand out as having APT characteristics. The same table suggests which critical control is most appropriate for that attack. The four attacks and the related controls are included in the table below: Attack Summary Attackers exploit new vulnerabilities on systems that lack critical patches in organizations that do not know that they are vulnerable because they lack continuous vulnerability assessments and effective remediation Attackers use malicious code to gain and maintain control of target machines, capture sensitive data, and then spread it to other systems, sometimes wielding code that disables or dodges signature-based anti-virus tools Attackers gain access to sensitive documents in an organization that does not properly identify and protect sensitive or separate it from nonsensitive information Attackers gain access to internal enterprise systems to gather and exfiltrate sensitiveinformation, without detection by the victim organization. Most Directly Related Control Critical Control 4: Continuous Vulnerability Assessment and Remediation Critical Control 5: Malware Defenses Critical Control 15: Controlled Access Based on the Need-to-Know Critical Control 17: Data Loss Prevention (DLP) The methodology described above for selecting a subset of controls led to the selection of Critical Controls 4, 5, 15, and 17. A proper analysis would not be complete Automating Crosswalk between SP 800 and the 20 Critical Controls 11 without comparing this subset of controls to a statistically proven subset of controls such as the one recommended by the Australian DSD. The Australian DSD determined that at least 85% of targeted cyber intrusions could be prevented by implementing four specific controls: 1. Patch applications such as PDF readers, Microsoft Office, Java, Flash Player, and web browsers; 2. Patch operating system vulnerabilities; 3. Minimize the number of users with administrative privileges; and 4. Use application white-listing to help prevent malicious software and other unapproved programs from running. It is the authors’ opinion that the subset of controls selected actually resonates with the Australia DSD recommendation: Australia’s DSD Controls 1 and 2 are in line with selecting Control 4 “Continuous Vulnerability Assessment and Remediation;” Australia’s DSD Control 3 is in line with selecting Controls 15 and 17 “Controlled Access Based on Need-to-Know, and DLP;” and Australia’s DSD Control 4 is in line with selecting Control 5 “Malware Defenses.” It is imperative that GIAC Enterprises protect its sensitive data -intellectual property. The risk-based methodology used resulted in a subset of controls which are rather unique in that they are information-focused, and not identical to statistically supported work such as the systems-focused Australia DSD. Based on GIAC Enterprises’ need, and the recent shift in attention from securing networks, to securing systems, to securing the data itself (CAG, 2011), we argue that GIAC Enterprises would benefit more from adopting our recommended subset of controls. Perhaps future work based on this research may provide evidence that this approach is more effective in securing intellectual property. Therefore, the subset of the 20 Critical Controls to implement first for GIAC Enterprises are: Controls 4, 5, 15, and 17. These controls lend themselves to automation, and so the next sections of the paper will highlight some automation approaches for these controls. Automating Crosswalk between SP 800 and the 20 Critical Controls 12 5. Automation Approach for Critical Controls 15 and 17 Critical Controls 15 and 17 of the 20 Critical Controls state that data access is to be controlled, and access to data should be on a need-to-know basis. In addition, data loss prevention capabilities should be in place. Going back to the “offense-informs-defense” theme, one needs to first understand how attackers exploit the absence of these controls, before attempting to automate them. 5.1 Exploiting the Absence of Critical Controls 15 and 17 Organizations often do not carefully identify and separate sensitive information from publicly available information on their information systems. Because there is no such separation between the two different types of information, internal users will have access to all or most of the sensitive information. This makes it easy for attackers who have penetrated the network to find and exfiltrate the sensitive information. What compounds the problem further is that an organization may not be monitoring data outflows to quickly detect such exfiltration. While some information is leaked as a result of theft or espionage, the vast majority of such problems occur from poorly understood data practices, lack of effective policy, and user error (CAG, 2011, p. 60). The loss of control over sensitive information (such as cookie sayings intellectual property) is a serious vulnerability, and introduces a high risk to GIAC Enterprises. 5.2 Focusing on the Data Over the last few years, there has been a noticeable shift in attention and investment from securing the network to securing systems within the network, and to securing the data itself (CAG, 2011). To be able to secure the sensitive data, one needs to know what constitutes sensitive data. Two main types of sensitive data exist: Regulatory Data, and Corporate Data. Automating Crosswalk between SP 800 and the 20 Critical Controls 13 Sensitive Regulatory Data Sensitive Corporate Data • Credit card data • Intellectual property • Privacy data (PII) • Financial information • Health care information • Trade secrets Regulatory Data is found in many organizations. It takes the same form regardless of which organization it is stored. On the flip side, Corporate Data is usually unique data that differs from one organization to another. The unique property of Corporate Data makes it more challenging to identify, control, and secure. The intellectual property of GIAC Enterprises (cookie sayings) falls into the Corporate Data type of sensitive data. Controlling sensitive data can take place when the data is at rest (e.g., data storage), when the data is in motion (e.g., network actions), and when the data is in use (e.g., endpoint actions). To facilitate controlling sensitive data, GIAC Enterprises need to establish a proper Data Loss Prevention (DLP) program. Control Data-at-Rest Control Data-in-Motion Control Data-in-Use 5.3 Establishing a Risk-based DLP Program There are many publications in the market about how complex and expensive (DLP) projects can get if not properly handled. It can be argued, a primary reason for such perception, is a lack of importance to people and process in DLP projects. Rather than considering DLP as a point product, one can benefit from considering DLP a Automating Crosswalk between SP 800 and the 20 Critical Controls 14 technology that helps build processes to prevent people from leaking sensitive data. To establish a proper DLP program for GIAC Enterprises, the following three-phased model is suggested: DLP Program Lifecycle Management (driven by risk-based policies) DISCOVER EDUCATE ENFORCE Risk across the Infrastructure End Users & Risk Teams Security Controls ? RISK Understand Risk Reduce Risk Time Whether sensitive data is being controlled at rest, in use or in motion, this threephased model will be used. The first step is to better understand risk by identifying sensitive data through a discovery process. The risk discovery phase can occur while data is in use, in motion, or at rest. The next step is where risk starts to be mitigated through education of both end users and risk teams. Finally, risk mitigation reaches its peak by enforcing effective security controls that don’t get in the way of business productivity. 5.4 Automating Data Classification and Policy Definition For GIAC Enterprises, the cookie sayings intellectual property is the data that needs to be controlled. As described earlier, this represents sensitive data of type: Corporate Data. For technology to identify sensitive data through a discovery process, it needs to understand what sensitive data is. It would be optimum to just tell technology that sensitive data is any cookie saying; unfortunately, it is not that simple. If cookie sayings one day become part of Regulatory Data (e.g., credit card number), then technology can easily understand that cookie sayings are sensitive data. Automating Crosswalk between SP 800 and the 20 Critical Controls 15 Data classification (defining data sensitivity) is a complex task, because only the business owners know this information. The sensitivity of cookie sayings, as well as other data, is dynamic and often varies by business function and time. It is a challenge for security teams to define what data is sensitive and how it should be handled according to policy. The logical approach is to involve the line of business in the process of data classification and policy definition, but involving line of business is not trivial. An effective way to address this challenge is by enabling the business owners to directly define what data is sensitive (or what criteria makes data sensitive), and how the sensitive data should be handled. To automate this challenge, a portal with a workflow engine can be used to complete the operation. This type of automation can be achieved by Governance, Risk, and Compliance (GRC) tools, if these tools are integrated with the DLP technology being used. One example of such a solution is the RSA DLP Policy Workflow Manager illustrated below: + Step 1 Identify files & set business rules Step 3 DLP Policy is routed for approval Business Managers Step 2 Create DLP Policy & check for feasibility DLP Admin End Users Step 4 Approve d DLP policy Policy applied across the organization It is important to point out that this stage is not about using a tool to go around and locate sensitive data all across the organization. This stage is merely defining what is it that we should look for, and when we find what we are looking for, how should it be handled. This stage is about defining criteria and rules, and not about scanning. The output of this stage is a set of risk-based DLP policies such as the following: Automating Crosswalk between SP 800 and the 20 Critical Controls 16 Enforce Security Controls Based on the Risk of a Violation User Action Defined in DLP Policy Data Sensitivity RISK LOW User Identity HIGH ALLOW QUARANTIN E MOVE ENCRYPT NOTIFY JUSTIFY BLOCK SHRED AUDIT COPY DELETE RMS (DRM) Manual or Automated Data sensitivity is one of three key elements constituting the risk level for a DLP policy. For sake of simplicity, GIAC Enterprises can initially start with only two classification levels: sensitive, and public. In the future, the classification levels can possibly be extended to three levels: Secret, private, and public. A properly integrated DLP and GRC solution represents an abstraction layer for the line of business to define technical DLP policies. These policies will then be used to control data in motion, at rest, or in use. This DLP and GRC integrated solution is technology that is helping to fill the undesired gap of people and process in DLP projects. Using such an automation approach for data classification and DLP policy definition can reduce the duration of these activities from weeks to days. This section helps to automate sub-control 15.1, and lays the foundation for automating most subcontrols of Critical Controls 15 and 17 (CAG, 2011, p. 55). 5.5 Automating the Control of Data-in-Motion People and process elements of DLP projects are often ignored. To address these two elements when automating the control of data in motion, GIAC Enterprises needs to follow this process: 1) Initially understand the risk of data-in-motion across the various protocols (Monitor only); 2) Just-in-time education can be introduced to users to mitigate risk (Monitor and Educate); and Automating Crosswalk between SP 800 and the 20 Critical Controls 17 3) In the enforcement phase, an action such as automating encryption of sensitive data can be implemented. Also in the final phase, unauthorized encrypted data can be blocked to mitigate the exfiltration of sensitive data that was encrypted by APTs (Automate Action). Process to Reach Automation (Data-in-Motion) ? RISK DISCOVER (Data-in-Motion) EDUCATE (Data-in-Motion) ENFORCE (Data-in-Motion) Risk Across: web protocols, emails, IM, generic TCP/IP protocols Users Just-in-Time Encryption, Blocking, etc. (Monitor Only) Understand Risk Action) (Monitor & Educate) (Automate Reduce Risk Time The following scenario is an example of just-in-time education when controlling data-in-motion: A GIAC Enterprises employee just sent out an email containing a sensitive cookie saying. When the network traffic is scanned by the DLP system, an alert is sent to the employee saying the email they just sent possibly violates GIAC Enterprises intellectual property policy. The alert would also include the policy itself and why this email represents a violation. The employee is then given the option (in figure below) of sending the email because they are sure this is not a policy violation, or not sending the email at all. The action is logged, and the employee is educated just-in-time. If the employee faces a similar experience in the future, the employee will likely make a better decision, and therefore, reduce GIAC Enterprises’ risk level. This section helps to automate sub-controls 17.2, 17.3, 17.5, 17.6, 17.9, 17.10 (CAG, 2011, pp. 61-62), and 15.4 (CAG, 2011, p. 55). Automating Crosswalk between SP 800 and the 20 Critical Controls 18 5.6 Automating the Control of Data-at-Rest/Data-in-Use At this stage, as well as the earlier stage of controlling data in motion, sensitive data has been identified using techniques highlighted in section 5.4. Where the sensitive data is, who has access to it, and how it is being used is still not clear at this point in time. The risk exposure is therefore unknown. When these questions are answered, the risk exposure becomes known. The focus of this section is to fix that by addressing how to answer these important questions in an automated manner. Moving on with the same theme (giving more attention to the people and process elements of DLP projects), GIAC Enterprises needs to follow this process for automating the control of data-at-rest and data-in-use: 1) Understand the risk of data-at-rest in all data stores. This requires scanning all data stores to identify where sensitive data is located. The tools available for this vary from open source tools such as OpenDLP, to commercial DLP tools. Once the location of sensitive data is identified, the next step is to know who has access to sensitive data, and whether they have a need-to-know. This other scanning operation is often performed using a different set of tools, some of which are free and gather ACLs of files and folders on network shares such as ShareEnum. Other tools may be built-in and monitor file activities, such as the Windows audit logging capability for files (Scanning); 2) Just-in-time education can be introduced to users to mitigate risk associated with sensitive data. As line-of-business becomes more educated, proper data governance policies can be defined (Monitor and Educate); and 3) In the enforcement phase, data governance policies can be implemented to further reduce risk. An action such as automating encryption of sensitive data at rest can be implemented. Also in this final phase, integration of DLP with other technologies, such as Digital Rights Management (DRM) tools can be leveraged. An integration example would be the automatic application of DRM controls on sensitive data when DLP senses the data is being copied to an external drive (Automate Action). Automating Crosswalk between SP 800 and the 20 Critical Controls 19 Process to Reach Automation (Data-at-Rest/-in-Use) DISCOVER EDUCATE ENFORCE (Data-at-Rest/-in-Use) (Data-at-Rest/-in-Use) (Data-at-Rest/-inUse) ? RISK Risk across Data Permissions and Stores: File shares, databases, endpoints, repositories, etc. (Scanning) Understand Risk Users Just-in-Time (Monitor & Educate) Data governance policy: Encryption, DRM, Block, Shred, Log, etc. (Automate Action) Reduce Risk Time For GIAC Enterprises, the cookie sayings intellectual property is likely scattered all across the organization. At this stage, the line of business has defined what sensitive data is and that is incorporated into DLP policies. The security/risk team now knows what it is they are looking for. The scanning operations that take place in the discovery phase of the above process will answer two important questions: 1) Where is the sensitive data?; and 2) Who has access to it? The answers to these two questions will help GIAC Enterprises understand the risks associated with sensitive data (cookie sayings) at rest and in use. It is definitely a challenge to locate sensitive data out of terabytes of data spread across multiple sites. In fact, it resembles trying to locate gems in extremely long sandy shores. Luckily, technology is available to overcome this problem, even in massive environments. Scanning technology of commercial DLP vendors can transform existing servers into a powerful cluster to scan terabytes of data in parallel with no additional hardware. Using temporary software agents, sensitive data is identified in multiple repositories such as file servers, endpoints, databases, and collaborative environments such as Microsoft SharePoint. Monitoring incremental changes to data repositories is possible to facilitate scanning on a regular basis. By bringing the scanning software to the data, and not vice versa, it is possible to scan massive amounts of data without saturating Automating Crosswalk between SP 800 and the 20 Critical Controls 20 the network. The figure below illustrates the architecture used to perform sensitive data discovery in a multi-site environment, with multiple data repositories: Databa se Main Data Center DLP Administrator Software Agents Secondary Data Center SharePoint Remote Offices After using technology in the discovery phase to answer where sensitive data is, one has a better understanding of risk. However, understanding the risk is only the first half of the story. The second half is risk remediation and it is not trivial. The second half of the story (risk remediation for sensitive data at rest) is around defining the appropriate data governance policy and applying it so that files with sensitive data content are properly protected. However, encrypting a file, moving it to a more secured repository, or changing its permissions without involving the end users of the file in the process can have a negative impact on any organization. The proper way to address this challenge is to involve the line of business in the remediation process. The benefit of this is that proper data governance policies can be defined for cookie sayings and the business is not negatively impacted. The drawback is the duration of the risk remediation process can significantly increase with emails, phone calls, and spreadsheets going back and forth between the security/risk team and the line of business to properly protect a large number of files located all around GIAC Enterprises. The drawback described earlier is a workflow challenge, and can be overcome using a proper risk management workflow module that automates risk remediation. This Automating Crosswalk between SP 800 and the 20 Critical Controls 21 type of automation can be achieved by GRC tools; especially if these tools are integrated with the scanning tools used to discover sensitive data, permissions, and file activity. The module would enable the security/risk team to send remediation options and questionnaires about the business context in an automated manner to the business owners. This empowers the business users to take appropriate decisions about the sensitive files they own. An example is the RSA DLP Risk Remediation Manager (RRM) solution as follows: SharePoint Grid Business Users Apply DRM Databases Virtual Grid Data Loss Prevention (DLP NAS/SAN Temp Agents File Servers Encrypt Risk Remediation Manager (RRM) RRM File Activity Tools GRC Systems Delete / Shred Change Permissions Policy Exception Agents Endpoints Discover Sensitive Data Manage Remediation Workflow Apply Controls Using such an automation approach for risk remediation of data-at-rest, can take down the duration time of these activities from months to weeks. The benefit of the automation approach is twofold: The automation will allow just-in-time education to the line-of-business, which will facilitate the definition of the data governance policy, and improve future actions; and The automation will significantly reduce the remediation time for data governance policy violations without negative business impact. This represents increasing the efficiency of a reactive control, and reduces the window of opportunity for APTs. Automating Crosswalk between SP 800 and the 20 Critical Controls 22 This section helps to automate sub-controls 15.2, 15.3, 15.5, 15.6, 15.7 (CAG, 2011, pp. 55-56), 17.4, and 17.7 (CAG, 2011, p. 61). 6. Automation Approach for Critical Controls 4 and 5 Critical controls 4 and 5 of the 20 Critical Controls state attackers exploit new vulnerabilities on systems that lack critical patches and use malicious code to gain control of target system which could allow for the capture of sensitive information such as cooking sayings from GIAC Enterprises. To fully understand what controls are best suited for the prevention and mitigation of APTs, one first needs to understand the attack vector typically used. Malware innovations have been driven by attackers’ quest to gain increasing control of compromised systems and the networks in which they reside. In a recent White paper sponsored by Imperva entitled, ‘Advanced Persistent Threat: Are You the Next Target?,’ a nice diagram detailing the anatomy of an APT attack is presented as follows (Bitpipe.com 2011): Automating Crosswalk between SP 800 and the 20 Critical Controls 23 Considering the dynamics of the advanced malware infection lifecycle, the following illustrates another commonly adopted infection approach (Damballa, 2011): 1) Victim surfs to a website or clicks on email with link (e.g. phishing, drive-by download); 2) Browser is redirected to a malicious dropper site; 3) Victim is misled into downloading the dropper - or dropper is automatically downloaded through an exploit; 4) Dropper unpacks on the Victim machine and runs; 5) Dropper contacts a new site: UPDATE; 6) UPDATE sends Command&Control (C&C) instructions; 7) Dropper contacts C&C Site #1 with Victim identity details; 8) C&C Site #1 sends encrypted malware with new C&C instructions. Might even be ‘locked' to Victim machine; 9) Malware is decrypted by Dropper and installed. Dropper may stay behind as false evidence for investigators, or delete itself so that investigators believe that no infection has occurred; and 10) Malware contacts C&C Site #2. Sends passwords/data/etc. as encrypted payload. Steps 8, 9, and 10 can repeat indefinitely, with the malware ‘evidence' and C&C connection instructions changing constantly. The malware can be repurposed or told to lay silent for prolonged periods of time. As one can deduce from the above description of APTs, the client is the primary target of the attackers. Through the use of social engineering, targeted spear phishing emails are sent to known key users in an organization. A carefully crafted email entices Automating Crosswalk between SP 800 and the 20 Critical Controls 24 an unsuspecting victim to click on a malicious attachment that is enhanced to appear as a typical file the user expects from the spoofed sender. Control 4 was chosen to help block the above threat vector by focusing on clientbased authenticated vulnerability scanning to include the presence or absence of key patches and quickly remediate any found vulnerabilities. Control 5 was chosen to reduce and remediate the effect malware has on APTs. 6.1 Exploiting the Absence of Critical Controls 4 and 5 Any time new vulnerabilities are discovered and reported by security researchers or vendors, attackers are quick to develop exploit code and immediately launch the attack. Delays in finding or patching software with exploitable vulnerabilities provides ample opportunity for persistent attackers to gain the critical foothold in the enterprise. Without thoroughly scanning for vulnerabilities and addressing discovered flaws proactively, leaves one open to system compromises. Also, malicious software is used to target end users via web browsing, email attachments, mobile devices, and other vectors. This code attempts to capture sensitive data, spreads it to other systems, as well as aims to avoid signature-based and even disables anti-virus tools running on systems (CAG, 2011, pp. 23-26). John Pescatore, a distinguished Gartner analyst, said at a recent Gartner Security and Risk Management Summit, “There is no such thing as the unstoppable attack in cybersecurity. Every attack, in order to succeed, needs to exploit avulnerability” (infosecurity.com, 2011). Without having a means to detect or prevent malicious software from being installed and then establishing a command and control channel, introduces risk to GIAC Enterprises that is unacceptable. 6.2 Focusing on the APTs, and the Threat Vectors through Continuous Monitoring Whether attackers use viruses, Trojans, bots, or rootkits, today’s malware is designed for the long-term control of compromised client machines. Advanced malware also established outbound communications across several different protocols to upload collected data and further download of malware payloads for additional criminal purposes. One of the keys to protecting sensitive data is through the means of continuous monitoring. This can include the aspect of verifying that systems are not susceptible to Automating Crosswalk between SP 800 and the 20 Critical Controls 25 well-known exploits through vulnerability assessments and being diligent in patch management. The Risk Assessment (RA-3) and Vulnerability Scanning (RA-5) guidance provided by NIST conforms to this concept. As shown in the workflow diagram below, an assessment of risk is performed, document risk, review results, and then update risk assessment. In regards to vulnerability scanning, a similar diagram is presented with a continual cycle of scanning for vulnerabilities, analyzes of scan reports, remediate legitimate vulnerabilities, correlate and share results to reduce systemic weaknesses or deficiencies (SP 800-53 Revision 3, 2010, pp. F92-93). Review and Update Risk Assessment Conduct Assessment of Risk Document Risk Assessment Results Workflow 1 - Risk Assessment Correlate and share results to reduce systemic weaknesses or deficiencies. Remediate Legitimate Vulnerabilities Workflow 2 – Vulnerability Scanning Conduct Vulnerability Scans Analyze Vulnerability Scan Reports Automating Crosswalk between SP 800 and the 20 Critical Controls 26 Continuous monitoring is a crucial element in the Risk Management Framework developed by NIST. NIST’s recently released SP 800-137, “Information Security Continuous Monitoring for Federal Information Systems and Organizations,” defines continuous monitoring as “maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decision” (SP 800137, 2011, p. vi). In addition, an organization’s overall security architecture and accompanying security program are monitored to ensure that organization-wide operations remain within an acceptable level or risk, despite any changes that occur. Recent guidance from the Office of Management and Budget on FISMA reporting emphasizes monitoring on an ongoing basis rather than periodic assessments (Jackson, 2011). 6.3 Control 4 - Automating Continuous Vulnerability Assessment and Remediation Considering that any APTs always starts with a compromised system that was vulnerable, a means to understanding what vulnerabilities exist and what patches are available to remediate them is critical. This is where GIAC Enterprises can take positive steps to protect and isolate themselves from easily prevented client-based exploits. Research indicates that a limited number of exploits in just a handful of widely used third-party applications are responsible for nearly all successful enterprise malware infections on Windows clients. According to research released last September by the research firm CSIS Security Group, a three-month study of real-time attack data showed that as many as 85% of all virus infections occurred as a result of automated drive-by attacks created with commercial exploit kits, and nearly all of them targeted the five popular third-party applications – Java Runtime Environment (JRE), Adobe Flash, Adobe Acrobat and Reader, Internet Explorer, and Apple QuickTime (Kruse, 2011). This research provides additional credence to the focus of the Australian DSD findings. Automated vulnerability scanning should run on all organizational assets on at least a weekly basis. Anytime a new system is introduced to the network, a scan should automatically occur. In addition, authenticated scans of known system types should occur. For example, an administrative account should be established on all windowsbased systems and the vulnerability scans should incorporate the privilege of this account Automating Crosswalk between SP 800 and the 20 Critical Controls 27 when performing scans. This can be part of an enterprise solution incorporating agentbased clients to facilitate the scans. Scanning tools should scan for specific functionality, ports, protocols, and services that should not be accessible to users or devices and for improperly configured systems. More importantly, modern scanners should determine if key operating system as well as third-party applications patches are applied Mobile code technologies such as Java, JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and VBScript should be closely monitored, and perhaps, even restricted. Malware targeting vulnerabilities in application layer software, as those mentioned above, needs to be restricted by ensuring all application software is at the most current release. Perhaps it is time to ban these dangerous third-party applications, as editorialized by Eric Parizo, Senior Site Editor of SearchSecurity.com (Parizo, 2012)? If not completely ban the use of third-party applications, consider implementing security controls such as removing Java from the Internet zone in Internet Explorer, configuring Adobe Reader to prompt for JavaScript execution, or disallowing embedded executables from running in PDFs. Research by Dan Guido and the Exploit Intelligence Project has proven these steps to be the most efficient (Guido, 2011). These vulnerabilities should be expressed in an industry-recognized vulnerability, configuration, and platform classification schemes. Also, languages such as Common Vulnerabilities and Exposure (CVE) naming convention that uses the Open Vulnerability Assessment Language (OVAL) to test for the existence of vulnerabilities. Other excellent resources for vulnerability information can be found in the Common Weakness Enumeration (CWE) and the National Vulnerability Database (NVD). Correlating the existence of known vulnerabilities that can be easily remedied by appropriate patching must be integrated into this process. By applying the known trifecta associated with quality vulnerability scanning and remediation, GIAC Enterprises can hit the ‘Sweet Spot’ to further reduce and eliminate easily exploitable holes. Automating Crosswalk between SP 800 and the 20 Critical Controls 28 By reducing or eliminating known security risks in the computing environment, GIAC Enterprises needs to follow this process for automating this critical control by: 1) Implement an automated approach to patching by utilizing solutions such as Microsoft Windows Update Service (WSUS) or other commercial management software for operating system and third-party software on all systems; 2) Identify, analyze, and remediate vulnerabilities by implementing an effective continuous vulnerability assessment program. All vulnerability scanning should be performed in authenticated mode either with agents running locally on each system to analyze the security configuration or with remote scanners that are given administrative rights on the client systems being tested; 3) Scanning tools should be tuned to identify changes over time on each client machine for both authorized and unauthorized services. This will assist in detecting backdoors that might have been created on a compromised system; and 4) Enlist senior management to provide effective incentives in the mitigation process by tracking the numbers of unmitigated, critical vulnerabilities for each group. One known commercial example of this is from Tenable Network Security, Inc., (who recently announced its Nessus Vulnerability Scanner and SecurityCenter) which now integrates with top patch management solutions, including Red Hat Network Satellite Server, Microsoft Windows Server Update Services (WSUS), Microsoft System Center Configuration Manager (SCCM), and VMware Go. The integration bridges the gap between vulnerability management and patch management solutions Automating Crosswalk between SP 800 and the 20 Critical Controls 29 (darkReading.com, 2011). This is a very viable solution to GIAC’s concerns of preventing malicious software from entering their enterprise. It is critical to have a strong vulnerability management and patch management strategy. In addition, they recently published a white paper entitled, ‘Real-Time Auditing for SANS Consensus Audit Guidelines – Leveraging Asset-Based Configuration and Vulnerability analysis with Real-Time Event Management’ (Gula, Fennelly, 2011). This paper describes how their solutions can be leveraged to achieve compliance with the SANS Consensus Audit Guidelines (CAG) by ensuring that key assets are properly configured and monitored for security compliance. It is interesting to note how it can assist in the focus of Control 4. The following table referenced from the aforementioned white paper outlines the effectiveness in helping GIAC Enterprises in this critical application of reducing the exposed footprint for virus and malware attacks. 4. Continuous Vulnerability Assessment and Remediation Interpretation Tenable Solution It is important to monitor systems for vulnerabilities in as close to real time as possible. Penetration tests can discover vulnerabilities in the IT infrastructure, but they are only a snapshot in time. A system that is scanned one day and found to be free of vulnerabilities may be completely exploitable the next day. Tenable was founded on the belief that it is crucial to monitor systems in a manner as close to real time as possible to ensure the organization does not drift out of compliance over time. The greater the gap between monitoring cycles, the more likely it is for vulnerabilities to be undetected. To achieve this goal, Tenable offers several technologies that can be leveraged: > Nessus can perform rapid network scans. A typical vulnerability scan can take just a few minutes. With the SC, multiple Nessus scanners can be combined to perform load balanced network scans. > Nessus credential scans can be leveraged to perform highly accurate and rapid configuration and vulnerability audits. Credentialed scans also enumerate all UDP and TCP ports in just a few seconds. > The Passive Vulnerability Scanner (PVS) monitors all network traffic in real time to find new hosts, new vulnerabilities, and new applications. It scans for the same vulnerabilities detected by the Nessus scanner. Automating Crosswalk between SP 800 and the 20 Critical Controls 30 This section helps to automate sub-controls 4.1, 4.2, 4.3, 4.4, 4.6, 4.7, and 4.8 (CAG, 2011, pp. 23-24). 6.4 Control 5 - Automating Continuous Monitoring of Malicious software and malware callbacks. According to the most recent security threat report that Sophos published, they reported that they analyzed 95,000 malware pieces every day, nearly doubling the amount tracked the prior year. This accounts for one unique file every 0.9 seconds, 24 hours per day, each day of the year (Sophos, 2011). Attackers have developed ways to bypass outdated security techniques, such as signatures, leaving businesses and consumers vulnerable to attack. Signature-based technologies like IPS and antivirus software, both within perimeter and endpoint solutions, are increasingly ineffective against this rapidly evolving, blended threat. In fact, Bob Walder from Gartner reported, “Some IPS/IDS/Next-Generation firewalls (NGFW) vendors are no better at handling evasions today than they were when they released their original products” (Walder, 2010). A common denominator to any malware delivery system is the human element. Quoting from the book, Information Security Management Handbook, Sixth Edition, “It is well recognized that the greatest information security danger to any organization is not a particular process, technology, or equipment, rather it is the people who work within the “system” that hide the inherent danger” (Tipon, Krause, 2007, Ch. 43). An educated work force is also critical to combating malware. With the sophisticated approach used by modern attackers to inject malware in an organization, it is almost impossible to prevent systems from being compromised. A process has to be in place to implement an incident response for when malware is detected. This process has to be timely in order to quickly contain any infections that have occurred. The efficiency of modern malware to gather propriety information and transmit it back via encrypted channels is too alarming to ignore. A compromised system has to be removed from the network as soon as possible through detection methods, then eradicated and recovered following best-practice incident response procedures. NIST, in 2005, introduces Special Publication 800-83 ‘Guide to Malware Incident Prevention and Handling’. This publication provides recommendations for improving an organization’s Automating Crosswalk between SP 800 and the 20 Critical Controls 31 malware incident prevention measures. It also gives extensive recommendations for enhancing an organization’s existing incident response capability so that it is better prepared to handle malware incidents (Mell, 2005). With the primary challenges businesses are facing today of zero-day and APT attacks, GIAC Enterprises needs to follow this process for automating, and thus, reducing the risk of data loss through malware infections by: 1) Implement basic and necessary malware protection. This includes both perimeter and endpoint solutions for Intrusion Prevention Systems (IPS) as well as antivirus/antimalware protection. Even though these typical signature-based solutions are increasingly not as effective, it still will prevent many infections from occurring. Host-based IPS (HIPS) can and should be implemented as another layer of protection. This can prevent known malware from infecting systems; 2) Train and educate users in the art of recognizing social engineering tactics. Conduct simulated, but real-world scenarios, such as sending targeted spear phishing email with a payload that reports successful installation back to IT management; 3) Configure laptops, workstations, and servers so that they will not auto-run content from USB, CD/DVDs, Firewire or other externally connectable sources; 4) Deploy network access control tools to verify security and patch-level compliance before granting access to network; 5) Implement a malware incident response process that quickly detects, contains, eradicates, and recovers malware infected hosts; and 6) Considering that the above recommendations might mitigate 80% of the risk to GIAC Enterprises, the remaining 20% is where the real challenge lies. With this in mind, advanced technology such as virtual inspection of executable malware and inspection engines that monitor malware infections in real time and identify and block communication from compromised systems to attackers command and control servers are needed. Recognizing the importance of the GIAC Enterprises cookie sayings, a technology needs to be recommended to compensate for the deficiencies just mentioned. In particular, how can one detect and prevent zero-day attacks? Is there a way to monitor both inbound and outbound traffic to detect command and control sessions? One Automating Crosswalk between SP 800 and the 20 Critical Controls 32 commercial example of such technology is FireEye, which recently shared its five key principles to designing an effective network-based defense. The five key principals which GIAC Enterprises will focus on are (FireEye, p. 5): 1) 2) 3) 4) 5) Dynamic defenses to stop targeted, zero-day attacks; Real-time protection to block data exfiltration attempts; Integrated inbound and outbound filtering across protocols; Accurate, low false positive rates; and Global intelligence on advanced threats to protect the local network. They have developed next-generation protection against stealth malware to prevent data loss and intellectual property theft. A diagram depicting this technology is included below (FireEye, pp. 6-8): Another example of a commercial solution sensor is provided by Damballa Failsafe (Damballa Failsafe, 2011). It fulfills GIAC Enterprises’ goal of monitoring malware infections in real time by monitoring DNS, egress and proxy traffic, and utilize multi-dimensional deep-packet inspection engines to correlate suspicious behaviors to rapidly identify and isolate a breach by blocking the communication from compromised endpoints to criminal C&C servers. The following diagram depicts this approach: Automating Crosswalk between SP 800 and the 20 Critical Controls 33 This section helps to automate sub-controls 5.1, 5.2, 5.3, 5.5, 5.6, 5.7, 5.8, and 5.9 (CAG, 2011, pp. 26-27). 7. Recommended Risk-based Action Plan Clearly APTs pose significant risks to GIAC Enterprises and other organizations. This has led the Chief Legal Officer (CLO), and Chief Information Officer (CIO) for GIAC Enterprises to express concern, since the organization has a responsibility to do what is reasonable and prudent to protect the stakeholders. Therefore, a special team has been assigned the task of analyzing requirements, and surveying available security standards and guidelines such as ISO, NIST, the 20 Critical Controls, and the Australian DSD 35 mitigating strategies. Appropriate research has also been conducted , and the relationship between the various frameworks has been mapped out. In addition, automation approaches have been developed for the most pressing controls from the point of view of the assigned team. One of the results of this research is a risk-based action plan for GIAC Enterprises to follow. The objective of this plan is to give tailored security guidance advice. The recommended plan is based on the action plan laid out at the end of the 20 Critical Controls – Consensus Audit Guidelines (CAG, 2011, p. 69), augmented with steps the team believes is essential for the organization’s specific requirements. Implementing all the 20 Critical Controls to the “advanced controls” level can take Automating Crosswalk between SP 800 and the 20 Critical Controls 34 multiple years. To quickly mitigate risk, the team believes that once the “Quick Wins” are implemented for the 20 Critical Controls, the focus should be on implementing controls 4, 5, 15, 17 right away. Action Plan: 1) Conduct a gap assessment to compare the organization’s current security stance to the detailed recommendations of the critical controls; 2) Implement the “quick win” critical controls to address the gaps identified by the assessment over the next one or two quarters; 3) Implement critical controls numbers 4 and 5. Leverage the suggested automation approaches included in this research. Reaching the “advanced controls” level is preferred, but not necessary; 4) Implement critical controls numbers 15 and 17. Leverage the suggested automation approaches included in this research. Reaching the “advanced controls” level is preferred, but not necessary; 5) Assign security personnel to analyze and understand how the remaining critical controls beyond quick wins, and controls: 4, 5, 15, 17 can be deployed; 6) For remaining controls, devise detailed plans to implement the “visibility and attribution” and “hardened configuration and improved information security hygiene” over the next year; and 7) Plan for the deployment of the “advanced controls” over the longer term, giving priority to controls: 4, 5, 15, and 17. Automating Crosswalk between SP 800 and the 20 Critical Controls 35 8. References Alperovitch, D. et al (2011, August 2). Revealed: Operation Shady Rat. Retrieved from http://blogs.mcafee.com/mcafee-labs/revealed-operation-shady-rat Andress, J. (2011). Advanced Persistent Threat. ISSA Journal, 2011(June), 18-24. Retrieved from https://www.issa.org/images/upload/files/AndressAdvanced%20Persistent%20Threat.pdf Baseline Standard of Due Care for Cybersecurity (2009, February, 23). U.S. Federal Cybersecurity Experts Name Top 20 Controls. Retrieved December 22, 2011, from http:// http://www.gilligangroupinc.com/headlines/2009/feb-23related/20090223-cag-press-release-pdf.html Binde, B. et al (2011, May 22). Assessing outbound traffic to uncover advanced persistent threat. Retrieved from http://www.sans.edu/student-files/projects/JWPBinde-McRee-OConnor.pdf Bitpipe.com (2011, September 22). Advanced Persistent Threat: Are You the Next Target? [White paper sponsored by Imperva]. Retrieved December 14, 2011, from http://www.bitpipe.com/detail/RES/1316630992_836.html?asrc=RSS_BP_TERM Command Party Five Ltd. (2011, September 01). SK Hack by an Advanced Persistent Threat. Retrieved from http://www.commandfive.com/papers/C5_APT_SKHack.pdf Consensus Audit Guidelines (CAG) Version 3.1 (2011, October 03). Twenty Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines (CAG). Retrieved December 23, 2011 from http://www.sans.org/critical-securitycontrols/cag3_1.pdf Continuity Central – The international business continuity information portal. (2012, January, 13). Twenty critical controls for effective cyber defense (U.K. Centre for the Protection of National Infrastructure). Website retrieved January 14, 2012, from http://continuitycentral.com/news06099.html Coviello, A. (2011, March 18). Open Letter to RSA Customers. Retrieved December 22, 2011, from RSA.com: http://www.rsa.com/node.aspx?id=3872 Automating Crosswalk between SP 800 and the 20 Critical Controls 36 Damballa. (2011). Advanced Malware. Retrieved January 2, 2012, from http://www.damballa.com/cyber-threats/advanced_malware.php Damballa Failsafe. (2011). Damballa Failsafe 5.0 Demo. Retrieved January 2, 2012, from http://www.damballa.com/solutions/damballa-failsafedemo.php?mkt_tok=3RkMMJWWfF9wsRokuKzPZKXonjHpfsX66OUkXaeg384 31UFwdcjKPmjr1YEIT9QhcOuuEwcWGog8xA1VGOGZcIE%3D darkReading.com (2011, December 13). Tenable Network Security Offers Unique Integration With Top Patch Management Solutions. Retrieved December 27, 2011, from http://www.darkreding.com/taxonomy/index/printarticle/id/232300437 Dausin, M. (2010, September 16). Top Cyber Security Risks 2010. Retrieved from http://dvlabs.tippingpoint.com/blog/2010/09/16/top-syber-security-risks-2010. E-Government Act of 2002. (2002, December 17). Public Law 107-347. Retrieved December 21, 2011, from website: http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ347.107.pdf FIPS PUB 200. (2006, March 09). Federal Information Processing Standards 200 – Announcing the Standard for Minimum Security Requirements for Federal Information and Information Systems. Website retrieved December 21, 2011, from http:// http://csrc.nist.gov/publications/fips/fips200/FIPS-200-finalmarch.pdf FireEye. (n.d.) 5 Design Principles for Advanced Malware Protection [White paper]. Retrieved December 27, 2011, from http://docs.media.bitpipe.com/io_10x/io_100086/item_407114/FireEye_5DesignP rinciples_wp.pdf FISMA Implementation Project. (2009, June 12). FISMA Implementation Project. Website retrieved December 21, 2011, from http://www.nist.gov/itl/csd/sma/fisma.cfm Guido, D. (2011, April 20) The Exploit Intelligence Project. Website retrieved January 28, 2012, from http://www.isecpartners.com/presentations/the-exploitintelligence-project.html Automating Crosswalk between SP 800 and the 20 Critical Controls 37 Gula, R., & Fennelly, C. (2011, November 16). Real-Time Auditing for SANS Consensus Audit Guidelines – Leveraging Asset-Based Configuration and Vulnerability Analysis with Real-Time Event Management. Retrieved December 28, 2011 from http://www.tenable.com/sites/drupal.dmz.tenablesecurity.com/files/uploads/docu ments/whitepapers/tenable_SANS-CAG_compliance.pdf InfoSecurity (2011, June 23). The Hype, and the Reality, Behind Advanced Persistent Threats. Website retrieved December 27, 2011, from http://www.infosecuritymagazine.com/view/18897/the-hype-and-the-reality-behind-advanced-persistentthreats/ Jackson, W. (2011, October, 03). NIST offers a how-to for must-do continuous monitoring. Website retrieved January 5, 2012, from http://gcn.com/Articles/2011/10/03/NIST-continuous-monitoringsecurity.aspx?Page=1 Kruse, P. (2011, September 27). This is how windows get infected by malware. Website retrieved January 28, 2012, from http://www.csis.dk.en.csis/news/3321. Lau, H. (2011, August 04). The Truth Behind the Shady Rat [Web log message]. Retrieved from http://www.symantec.com/connect/blogs/truth-behind-shady-rat McClure, S. et al. (2010, March 03). Protecting Your Critical Assets: Lessons Learned from “Operation Aurora” [White paper]. Retrieved December 22, 2011, from McAfee.com: http://www.mcafee.com/us/resources/white-papers/wp-protectingcritical-assets.pdf Mell, P. et al. (2005, November 23). Special Publication 800-83 - Guide to Malware Incident Prevention and Handling. Website retrieved January 30, 2012, from http://csrc.nist.gov/publications/nistpubs/800-83/SP800-83.pdf Parizo, E. (2012, January, 27). Time to ban dangerous apps? Exploring third-party app security. Website retrieved January 27, 2012, from http://searchsecurity.techtarget.com/opinion/Time-to-ban-dangerous-appsExploring-third-party-app-security?asrc=EM_NLN_16192387&track=NL105&ad=860220& Automating Crosswalk between SP 800 and the 20 Critical Controls 38 RSA Data Loss Prevention (DLP) Suite (2011, December 20). Retrieved from http://www.rsa.com/node.aspx?id=3426 RSA Data Loss Prevention (DLP) Policy Workflow Manager (PWM) (2011, December 23). Retrieved from http://www.rsa.com/products/DLP/ds/11436_DLPPWM_DS_0611.pdf RSA Data Loss Prevention (DLP) Risk Remediation Manager (RRM) (2011, December 24). Retrieved from http://www.rsa.com/products/DLP/ds/11435_DLPRRM_DS_0611.pdf SANS Press Release. (2011, October 24). Australian Defence Signals Directorate wins U.S. National Cybersecurity Innovation Award – Identifying and Implementing the Four Key Controls That Stop the Spread of Targeted Cyber Intrusions. Retrieved January 13, 2012, from http://www.sans.org/press/australian-defencesignals-directorate-national-cybersecurity-award.php Shook, S. et al. (2011, February 10). Global Energy Cyberattacks: “Night Dragon”. Retrieved from http://www.mcafee.com/in/resources/white-papers/wp-globalenergy-cyberattacks-night-dragon.pdf Smith, M. (2011, February 27). NIST SP 800-53 Rev. 4 already in the works. Retrieved December 22, 2011, from http:// http://netlocksmith.blogspot.com/2011/02/nistsp-800-53-rev-4-already-in-works.html Sophos. (2011). Security threat report 2011 [White paper]. Retrieved from http://www.sophos.com/medialibrary/Gated Assets/white papers/sophossecuritythreatreport2011wpna.pdf SP 800-137. (2011, September). NIST Special Publication 800-137 – Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. Website retrieved January 5, 2012, from http://csrc.nist.gov/publications/nistpubs/800-137/SP800-137-Final.pdf SP 800-53 Revision 3. (2010, May 01). NIST Special Publication 800-53 Revision 3 – Recommended Security Controls for Federal Information Systems and Organizations. Website retrieved December 21, 2011, from http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3final_updated-errata_05-01-2010.pdf. Automating Crosswalk between SP 800 and the 20 Critical Controls 39 Tipon, H. & Krause, M. (2007). Information security management handbook, sixth edition. [Books24x7 version] Available from http://common.books24x7.com/toc.aspx?bookid=26438 Walder, B. (2010, November 29). Advanced Evasion Technologies: Weapon of Mass Destruction or Absolute Dud?. Retrieved December 29, 2011 from http://www.stonesoft.com/export/download/partner_mat/advanced_evasion_techn iques__209087.pdf Automating Crosswalk between SP 800 and the 20 Critical Controls 40 9. APPENDIX Appendix A: FIPS PUB 200 - Specifications for Minimum Security Requirements Specifications Access Control (AC) Awareness and Training (AT) Audit and Accountability (AU) Certification, Accreditation, and Security Assessments (CA) Description Organizations must limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems) and to the types of transactions and functions that authorized users are permitted to exercise. Organizations must: (i) ensure that managers and users of organizational information systems are made aware of the security risks associated with their activities and of the applicable laws, Executive Orders, directives, policies, standards, instructions, regulations, or procedures related to the security of organizational information systems; and (ii) ensure that organizational personnel are adequately trained to carry out their assigned information security-related duties and responsibilities. Organizations must: (i) create, protect, and retain information system audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity; and (ii) ensure that the actions of individual information system users can be uniquely traced to those users so they can be held accountable for their actions. Organizations must: (i) periodically assess the security controls in organizational information systems to determine if the controls are effective in their application; (ii) develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational information systems; (iii) authorize the operation of organizational information systems and any associated information system connections; and Automating Crosswalk between SP 800 and the 20 Critical Controls 41 Configuration Management (CM) Contingency Planning (CP) Identification and Authentication (IA) Incident Response (IR) Maintenance (MA) Media Protection (MP) (iv) monitor information system security controls on an ongoing basis to ensure the continued effectiveness of the controls. Organizations must: (i) establish and maintain baseline configurations and inventories of organizational information systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; and (ii) establish and enforce security configuration settings for information technology products employed in organizational information systems. Organizations must establish, maintain, and effectively implement plans for emergency response, backup operations, and post-disaster recovery for organizational information systems to ensure the availability of critical information resources and continuity of operations in emergency situations. Organizations must identify information system users, processes acting on behalf of users, or devices and authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. Organizations must: (i) establish an operational incident handling capability for organizational information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities; and (ii) track, document, and report incidents to appropriate organizational officials and/or authorities. Organizations must: (i) perform periodic and timely maintenance on organizational information systems; and (ii) provide effective controls on the tools, techniques, mechanisms, and personnel used to conduct information system maintenance. Organizations must: (i) protect information system media, both paper and digital; (ii) limit access to information on information system media to authorized users; and (iii) sanitize or destroy information system media before disposal or release for reuse. Automating Crosswalk between SP 800 and the 20 Critical Controls 42 Physical and Environmental Protection (PE) Planning (PL) Personnel Security (PS) Risk Assessment (RA) System and Services Acquisition (SA) Organizations must: (i) limit physical access to information systems, equipment, and the respective operating environments to authorized individuals; (ii) protect the physical plant and support infrastructure for information systems; (iii) provide supporting utilities for information systems; (iv) protect information systems against environmental hazards; and (v) provide appropriate environmental controls in facilities containing information systems. Organizations must develop, document, periodically update, and implement security plans for organizational information systems that describe the security controls in place or planned for the information systems and the rules of behavior for individuals accessing the information systems. Organizations must: (i) ensure that individuals occupying positions of responsibility within organizations (including third-party service providers) are trustworthy and meet established security criteria for those positions; (ii) ensure that organizational information and information systems are protected during and after personnel actions such as terminations and transfers; and (iii) employ formal sanctions for personnel failing to comply with organizational security policies and procedures. Organizations must periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational information systems and the associated processing, storage, or transmission of organizational information. Organizations must: (i) allocate sufficient resources to adequately protect organizational information systems; (ii) employ system development life cycle processes that incorporate information security considerations; (iii) employ software usage and installation restrictions; and (iv) ensure that third-party providers employ adequate security measures to protect information, applications, and/or services outsourced from the organization. Automating Crosswalk between SP 800 and the 20 Critical Controls 43 System and Communications Protection (SC) System and Information Integrity (SI) Organizations must: (i) monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems; and (ii) employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational information systems. Organizations must: (i) identify, report, and correct information and information system flaws in a timely manner; (ii) provide protection from malicious code at appropriate locations within organizational information systems; and (iii) monitor information system security alerts and advisories and take appropriate actions in response. Automating Crosswalk between SP 800 and the 20 Critical Controls 44 Appendix B: Mapping between the 20 Critical Security Controls and National Institute of Standards and Technology Special Publication 800-53, Revision 3, Priority 1 Items Control Critical Control 1: Inventory of Authorized and Unauthorized Devices Critical Control 2: Inventory of Authorized and Unauthorized Software Critical Control 3: Secure Configurations for Hardware and Software Critical Control 4: Continuous Vulnerability Assessment and Remediation Critical Control 5: Malware Defenses Critical Control 6: Application Software Security Critical Control 7: Wireless Device Control Critical Control 8: Data Recovery Capability Critical Control 9: Security Skills Assessment and Appropriate Training to Fill Gaps Critical Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Critical Control 11: Limitation and Control of Network Ports, Protocols, and Services Critical Control 12: Controlled Use of Administrative Privileges Critical Control 13: Boundary Defense Critical Control 14: Maintenance, Monitoring, and Analysis of Security Audit Log Critical Control 15: Controlled Access Based on the Need to Know Critical Control 16: Account Monitoring and Control References CM-8 (a, c, d, 2, 3, 4), PM-5, PM-6 CM-1, CM-2 (2, 4, 5), CM-3, CM-5 (2, 7), CM-7 (1, 2), CM-8 (1, 2, 3, 4, 6), CM-9, PM-6, SA-6, SA-7 CM-1, CM-2 (1, 2), CM-3 (b, c, d, e, 2, 3), CM-5 (2), CM-6 (1, 2, 4), CM-7 (1), SA-1 (a), SA-4 (5), SI-7 (3), PM-6 RA-3 (a, b, c, d), RA-5 (a, b, 1, 2, 5, 6) SC-18, SC-26, SI-3 (a, b, 1, 2, 5, 6) CM-7, RA-5 (a, 1), SA-3, SA-4 (3), SA-8, SI-3, SI-10 AC-17, AC-18 (1, 2, 3, 4), SC-9 (1), SC24, SI-4 (14, 15) CP-9 (a, b, d, 1, 3), CP-10 (6) AT-1, AT-2 (1), AT-3 (1) AC-4 (7, 10, 11, 16), CM-1, CM-2 (1), CM-3 (2), CM-5 (1, 2, 5), CM-6 (4), CM-7 (1, 3), IA-2 (1, 6), IA-5, IA-8, RA-5, SC-7 (2, 4, 5, 6, 8, 11, 13, 14, 18), SC-9 CM-6 (a, b, d, 2, 3), CM-7 (1), SC-7 (4, 5, 11, 12) AC-6 (2, 5), AC-17 (3), AC-19, AU-2 (4) AC-17 (1), AC-20, CA-3, IA-2 (1, 2), IA-8, RA-5, SC-7 (1, 2, 3, 8, 10, 11, 14), SC-18, SI-4 (c, 1, 4, 5, 11), PM-7 AC-17 (1), AC-19, AU-2 (4), AU-3 (1,2), AU-4, AU-5, AU-6 (a, 1, 5), AU-8, AU-9 (1, 2), AU-12 (2), SI-4 (8) AC-1, AC-2 (b, c), AC-3 (4), AC-4, AC-6, MP-3, RA-2 (a) AC-2 (e, f, g, h, j, 2, 3, 4, 5), AC-3 Automating Crosswalk between SP 800 and the 20 Critical Controls 45 Critical Control 17: Data Loss Prevention Critical Control 18: Incident Response Capability Critical Control 19: Secure Network Engineering Critical Control 20: Penetration Tests and Red Team Exercises AC-4, MP-2 (2), MP-4 (1), SC-7 (6, 10), SC-9, SC-13, SC-28 (1), SI-4 (4, 11), PM-7 IR-1, IR-2 (1), IR-4, IR-5, IR-6 (a), IR-8 IR-4 (2), SA-8, SC-7 (1, 13), SC-20, SC21, SC-22, PM-7 CA-2 (1, 2), CA-7 (1, 2), RA-3, RA-5 (4, 9), SA-12 (7) Automating Crosswalk between SP 800 and the 20 Critical Controls 46 Appendix C: Mapping between the 20 Critical Security Controls and the Australian Government Defence Signals Directorate’s 35 Mitigation Strategies Mitigation Strategy Effectiveness Ranking 1 2 3 4 5 6 7 8 9 10 Mitigation Strategy Patch applications (e.g., PDF viewer, Flash Player, Microsoft Office and Java). Patch or mitigate within two days for high-risk vulnerabilities. Use the latest version of applications. Patch operating system vulnerabilities. Patch or mitigate within two days for high-risk vulnerabilities. Use the latest operating system version. Minimize the number of users with domain or local administrative privileges. Such users should use a separate unprivileged account for e-mail and web browsing. Application white listing to help prevent malicious software and other unapproved programs from running (e.g., by using Microsoft Software Restriction Policies or AppLocker). Host-based intrusion detection/prevention system to identify anomalous behavior such as process injection, keystroke logging, driver loading, and call hooking. White-listed email content filtering allowing only attachment types required for business functionality. Preferably convert/sanitize PDF and Microsoft Office attachments. Block spoofed e-mails using sender policy framework checking of incoming e-mails, and a “hard fail” SPF record to help prevent spoofing of your organization’s domain. User education (e.g., Internet threats and spear phishing socially engineered emails). Avoid weak pass phrases, pass phrase re-use, exposing e-mail addresses, unapproved USB devices. Web content filtering of incoming and outgoing traffic, using signatures, reputation ratings, and other heuristics, and white listing allowed types of web content. Web domain white listing for all domains, since this approach is more proactive and thorough than black listing a tiny percentage of malicious domains. Matching Top 20 Critical Controls 4.3 4.3 19.1, 19.6 2.4 8.1, 8.6 8.5 12.5 19.1, 17.1, 17.2, 17.3, 17.4, 17.5 12.1, 12.2, 12.3 12.1, 12.7 Automating Crosswalk between SP 800 and the 20 Critical Controls 47 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Web domain whitelisting for HTTPS/SSL domains, since this approach is more proactive and thorough than black listing a tiny percentage of malicious domains. Workstation inspection of Microsoft Office files for abnormalities (e.g., using the Microsoft Office File Validation feature). Application-based workstation firewall, configured to deny traffic by default, to protect against malicious or otherwise unauthorized incoming network traffic. Application-based workstation firewall, configured to deny traffic by default, that white lists which applications are allowed to generate outgoing network traffic. Network segmentation and segregation into security zones to protect sensitive information and critical services such as user authentication and user directory information. Multi-factor authentication especially implemented for when the user is about to perform a privileged action, or access a database or other sensitive information repository. Randomized local administrator pass phrases that are unique and complex for all computers. Use domain group privileges instead of local administrator accounts. Enforce a strong pass phrase policy covering complexity and length, and avoiding both pass phrase re-use and the use of dictionary words. Border gateway using an IPv6-capable firewall to prevent computers from directly accessing the Internet except via a split DNS server, an e-mail server, or an authenticated web proxy. Data execution prevention using hardware and software mechanisms for all software applications that support DEP. Anti-virus software with up-to-date signatures, reputation ratings, and other heuristic detection capabilities. Use gateway and desktop anti-virus software from different vendors. Nonpersistent, virtualized trusted operating environment with limited access to network file shares, for risky activities such as reading e-mail and web browsing. Centralized and time-synchronized logging of allowed and blocked network activity, with regular log analysis, storing logs for at least 18 months. Centralized and time-synchronized logging of successful and failed computer events, with regular log analysis, storing logs for at least 18 months. 12.1, 12.7 8.1, 8.6 3.3, 8.1, 5.1 3.3, 8.1, 8.8, 5.1 10.8, 12.6, 20.4, 11.1, 11.5 10.6, 19.11 19.1, 19.7 19.1, 19.8, 13.7 10.5, 12.7, 11.3 3.3 8.1, 8.2, 8.5, 8.6 2.6 7.1, 7.3, 7.5, 7.6, 7.7 7.1, 7.4, 7.5, 7.6 Automating Crosswalk between SP 800 and the 20 Critical Controls 48 25 26 27 28 29 30 31 32 33 34 35 Standard operating environment with unrequired operating system functionality disabled (e.g., IPv6, autorun and Remote Desktop). Harden file and registry permissions. Workstation application security configuration hardening (e.g., disable unrequired features in PDF viewers, Microsoft Office applications, and web browsers). Restrict access to NetBIOS services running on workstations and on servers where possible. Server application security configuration hardening (e.g., databases, web applications, customer relationship management, and other data storage systems). Removable and portable media control as part of a data loss prevention strategy, including storage, handling, white listing allowed USB devices, encryption, and destruction. TLS encryption between e-mail servers to help prevent legitimate e-mails from being intercepted and used for social engineering. Perform content scanning after email traffic is decrypted. Disable LanMan password support and cached credentials on workstations and servers to make it harder for adversaries to crack password hashes. Block attempts to access websites by their IP address instead of by their domain name. Network-based intrusion detection/prevention system using signatures and heuristics to identify anomalous traffic both internally and crossing network perimeter boundaries. Gateway black listing to block access to known malicious domains and IP addresses, including dynamic and other domains provided free to anonymous Internet users. Full network traffic capture to perform post-incident analysis of successful intrusions, storing network traffic for at least the previous seven days. 3.1, 3.2, 3.3, 8.3 3.1, 3.2, 3.3 20.3, 20.4 3.1, 3.2, 3.3 8.3, 8.4, 9.7, 9.8, 9.10 20.4 3.1, 3.2, 3.3, 19.5 12.1, 12.7 12.2, 12.3 12.1 12.4