Incorporating Cyber Threat Intelligence into Security Assessment Programs Security Assessment Team SAT BLUE “Identifying Vulnerabilities” SAT Red “Simulating Threats” Identifying what works and what needs working on with respect to preventing, detecting, and responding to cyber threats Tumble, Twiddle, Spin & Roll the Black Hat • Tumble – Terminology: what’s in a word? • Twiddle – Threats: vulnerable, moi? • Spin – CTI: how to use your intelligence? • Roll – Reports: show’em the light! Doggy Bag - “Um, I’ll take those thoughts to go, please.” Tumble the Black Hat Tumbling the Black Hat “I don’t think that word means what you think it means.” The Buzzwords? RED: Simulating Threats Red Teaming, Pentesting Black Box, Grey Box, White Box, Purple Box, Pink Box… Florescent Box (80s) Tie-dye Box (70s) Tandem Pentest Blind Pentest, Double-Blind Crystal Box Pentesting Ethical Hacking BLUE: Finding Vulnerabilities Blue Teaming Security Assessment Vulnerability Assessment Security Scan Security Testing “What works. What needs working on.” Tumbling the Black Hat “I don’t think that word means what you think it means.” Builders Vs Breakers Beyond the Security Auditor’s Perspective • System boundaries - well-defined, political, arbitrary Threats just look for vulnerabilities and exploit them • Identify ‘failures’ – scripted, criteria open to interpretation Threats just look for vulnerabilities and exploit them • Technical generalists – they ‘scan,’ heavily restricted Threats are diverse and… they just look for vulnerabilities and exploit them • Fancy graphs, bucket lists, detailed matrices about your state of risk Threats found vulnerabilities and exploited them Twiddle Black Hat the Twiddling the Black Hat Vulnerable, moi? Cyber Threat Intelligence Get to know the bad guys and gals • Who are the threats? • What are their motivations? • What are their objectives? • What tools & techniques do they use? Twiddling the Black Hat Vulnerable, moi? Use your CTI collection Kung Fu to Get to know yourself 1 • The “big picture” • Business risks: financial, regulator, market… 2 • Technology & mission • What is on your networks? Hacking at the speed of light A vulnerability, isn’t a vulnerability, isn’t a vulnerability Spin the Black Hat Spin the Black Hat Using your cyber threat intelligence Approaching Blue/Red Team Security Assessments From a threats perspective • Priorities/Objectives • Scope • Duration • Frequency Driven by what matters, Effective use of resources Driven by the threat perspective Not politics , personalities, or auditors Take the time it takes to do good work No “scans,” one day pentest Continuous blue/red assessments Once a year is not good enough Spin the Black Hat Using your cyber threat intelligence Approaching Blue/Red Team Security Assessments From a threats perspective • Test Points • Information • Rules of Engagement • People Blue – Everything / Red - Threats Use your access, be comprehensive Blue – Everything / Red - Everything No politics, personalities, or p…p…auditors Realistic, use creativity Not too constraining to be useful Teams of security professionals Security professionals are not one size fits all Roll the Black Hat Roll the Black Hat Show’em the light! The REPORT…is EVERYTHING Don’t just hack around for the fun of it. It’s irresponsible. A Few Ideas Blue Team Reports • Real world examples • Language your customers understand • Provide context – impact to mission Red Team Reports • • • • It is not about you! Details - what did not work? Why? Identify real problems, provide real solutions Don’t forget DETECTION and INCIDENT RESPONSE Roll the Black Hat Show’em the light! The Many Ways to Disseminate Information Use your intelligence, use your results, and use your creativity A Few Ideas • Road show • Tailored presentations – ‘techies’, ‘security,’ ‘management’ • Demo TTPs – “hacker series” The Doggy Bag The Doggy Bag Some thoughts to take home 1. Assess from a threat perspective - Builders vs. Breakers 2. Continuously discover “what works, does not work, and what needs working on” 3. Assess prevention, detection, and response – all three! 4. Understand the threats, understand your business, and provide real solutions to real problems 5. Influence vs. dictate change 6. Free your people – let them be creative The End