Ben Christensen Senior Compliance Risk Analyst, Cyber Security Best Practices for Conducting Cyber Security Assessments June 5, 2014 CIPUG Meeting, Salt Lake City Agenda • • • • • 2 Why are security assessments important? Types of security assessments Risks related to security assessments Best practices for security assessments How security assessments can help with CIP-005 & CIP-007 Benefits to Entities • Help maintain CIP compliance • Verify security controls that should already be in place • Define the risks associated with your cyber security systems and how to mitigate them • Highlight your controls to help you determine the risk to reliability 3 Traditional IT assessment vs. security risk assessment • IT focuses on accidental outages, hardware failures, and uptime • Security risk assessment is the analysis of issues relating directly to security threats 4 Types of Assessments Security audits Policies, procedures, other admin controls Change management Architectural review Penetration tests Vulnerability assessments 5 Security audits Manual or systematic measurable technical assessment of how the organization's security policy is employed. 6 Security audits • Looks at how effectively the security policy has been implemented • Measure security policy compliance • Recommends solutions to deficiencies • May be performed through: o Informal self audits o Formal IT audits 7 Components of a security audit File system security Physical security Ports & services Installation/configuration Security event logging Account security Backups & Disaster recovery Network device restrictions 8 Policies, procedures and other administrative controls • Security assessment ultimately shows the effectiveness of policies • Assess your policies to know how effectively they have been implemented 9 Policies, procedures and other administrative controls 10 Documents Training Updates • What are they? • How often are they reviewed? • Acknowledge adherence to • Who has them? • Who is trained? • How often? • Does it measure effectiveness? • Who makes the updates? • How often are they made? • How are employees notified? Change management • Have you assessed how your change management is doing? • Are personnel really following it? • How do you know? 11 Change management • Is the change management performed on a regular basis? • Is physical security part of the change management process? • How are changes approved? • Where are changes documented? • Who signs off on the changes? • Who implements the changes? 12 Architectural review • Review network artifacts o Network diagrams o Security requirements o Inventory • Identify data flows • Identify controls • Identify gaps 13 Architectural review Current network diagram Physical walkthrough Trace cables Look for modems Network devices Logging enabled? Restricted access? Remote admin connections? Firewall review Remote access connections 14 Process to evaluate risk of opening ports and services? Penetration testing Attacking a computer system to find security weaknesses and to potentially gain access. Warning: penetration tests can have serious consequences to the systems involved! 15 Penetration testing Penetration Test Planning & Preparation Gather Information & Analysis Vulnerability Detection Penetration Attempt Analysis & Reporting Clean Up 16 Penetration testing Plan & Prep • Scope • Duration • Decide who to inform • Legal agreements 17 Info Gathering & Analysis Vulnerability Detection • Get info about target • Network survey • Port scanning • Determine vulnerabilities • Manual vulnerability scanning Penetration testing Penetration Attempt Analysis & Reporting • Choose targets • Choose exploit • Password cracking • Social engineering • Physical security • Generate report • Analysis & commentary • Highlight vulnerabilities • Summary • Details • Suggestions 18 Clean Up • Get rid of mess • List of actions • Verified by organization Vulnerability assessments As documented by SANS, “Vulnerabilities are the gateways by which threats are manifested”. “A vulnerability assessment is a search for these weaknesses/exposures in order to apply a patch or fix to prevent a compromise”. http://www.sans.org/reading-room/whitepapers/basics/vulnerabilityassessment-421 19 Vulnerability assessments Catalog assets 20 Assign value and importance Identify vulnerabilities or threats Mitigate or eliminate vulnerabilities Vulnerability assessments • Methods to counteract weaknesses o o o o o o 21 Use baselines Patching Vulnerability scanning Following security advisors Use perimeter defenses Use intrusion detection systems and AV Vulnerability assessments vs. Penetration test • Vulnerability assessment uncovers the weaknesses and shows how to fix them • Penetration test shows if someone can break in and what information they can get Vulnerability Assessment 22 Penetration Test Which assessment should I use? • Depends on your requirements and goals • Security assessment might be too broad • Penetration test may not identify all vulnerabilities and could cause harm • Can’t we just do the CVA as required for CIP? 23 Risks of assessments • Vulnerability assessment or penetration test might cause instability or harm to systems • Penetration test might not uncover all your vulnerabilities • You might incorrectly rely on results and assume you are secure • Results may not be presented in a way to provide value 24 Best practices • Assessment should provide value beyond the raw data – Analyze the data to see what it means for your organization • Identify trends that highlight underlying problems – Might reveal a bigger problem Best practices • Use combination of techniques to provide a complete picture of your security o No one size fits all • Use the techniques that best meet your requirements • Provide answers in your assessment, not just problems • Share what you learn with employees o Bring security to the forefront 26 CIP-005 and CIP-007 • The assessments presented today can work hand in hand with the CVA • CIP Standards provide a minimum set of controls • Consider performing these assessments in conjunction with your CIP-005 and CIP-007 obligations 27 CVA Checklist Review process • Do personnel know about the process? • Are personnel regularly trained on process? • Are personnel following the process? Current inventory of devices • How do you account for changes? • Who updates the inventory? • Where is it stored? 28 CVA Checklist Verify ports and services • Which tools will be used? • Are personnel trained on the tools? • How and where will the raw data be stored? Discover all access points • Don’t forget multi-homed devices • Wireless • Physical walkthrough 29 CVA Checklist Review controls for • Default accounts • Passwords • Network management & community strings Results • How will the results be stored? • Where will the results be stored? 30 CVA Checklist Plan to mitigate vulnerabilities • Who will implement fixes? • How will the fixes be implemented? Execution status of action plan • When will the fixes be implemented? • Are dates current? 31 CIP-005 and CIP-007 Default accounts Passwords Ports and services Process 32 Community strings Assessments Results & action plan Additional Resources Additional Resources • SANS – Implementing a Successful Security Assessment Process o http://www.sans.org/readingroom/whitepapers/basics/implementingsuccessful-security-assessment-process-450 • NIST – Security Assessment Provider Requirements and Customer Responsibilities o http://csrc.nist.gov/publications/drafts/nistir7328/NISTIR_7328-ipdraft.pdf 34 Additional Resources • SANS – Security Auditing: A Continuous Process o http://www.sans.org/readingroom/whitepapers/auditing/security-auditingcontinuous-process-1150 • NIST Special Publication 800-53 o http://nvlpubs.nist.gov/nistpubs/SpecialPublicati ons/NIST.SP.800-53r4.pdf 35 Additional Resources • SANS - Conducting a Penetration Test on an Organization o http://www.sans.org/readingroom/whitepapers/auditing/conductingpenetration-test-organization-67 • SANS - Vulnerability Assessment o http://www.sans.org/readingroom/whitepapers/basics/vulnerabilityassessment-421 36 Additional Resources • NIST - Technical Guide to Information Security Testing and Assessment o http://csrc.nist.gov/publications/nistpubs/800115/SP800-115.pdf • ISACA – Project: Vendor Security Risk Assessment o http://www.isaca.org/Groups/ProfessionalEnglish/information-secuirtymanagement/GroupDocuments/Vendor%20Security%2 0Risk%20Assessment%20report.pdf 37 Additional Resources • Dark Reading - How To Conduct An Effective IT Security Risk Assessment o http://www.darkreading.com/how-to-conductan-effective-it-security-risk-assessment/d/did/1138995? 38 Summary Importance of assessments Many types you can perform Why you should go beyond the CVA Best practices Other resources 39 Questions? Ben Christensen (801) 819-7666 bchristensen@wecc.biz