Issue #11 – August 2013 ASD CYBER SECURITY BULLETIN A time for leadership Cyber security must be given due diligence across the management of Australian government organisations. We all hold information that affects the lives of the public. Be it personal, financial or even security information, we have a responsibility to protect that data. Just like we have to be accountable in our corporate finance dealings, we are also obligated to protect our information and networks. Senior executives are the key to leading the charge in strengthening the security posture of their organisations. Without strong senior leadership and real commitment to improving network and information security, the success of malicious cyber activity will not diminish. Organisational leaders can enable and resource their ICT security staff and programs to not only implement secure practices now, but also incorporate security requirements into future projects and planning. This can then be bolstered with staff education programs to improve the overall security culture of agencies. Ongoing concerns about the level and impact of cyber intrusions led the Attorney-General’s Department to now require the application of ASD’s ‘Top 4’ Strategies to Mitigate Targeted Cyber Intrusions be mandatory under the Protective Security Policy Framework. This will help make Australian government networks among the hardest to compromise. ASD – as the Commonwealth authority on cyber security – will continue to provide advice and assistance to agencies to strengthen their ICT security. ASD aims to enable senior leaders to devote adequate attention and resources to this top national security priority. Now is the time for leadership. Joe Franzi is the Assistant Secretary for Cyber Security at the Australian Signals Directorate. Issue #11 – August 2013 Inside this issue A time for leadership................... 1 Avoid being caught in a pinch overseas.............................. 2 Think before you BYOD................. 3 Coming Soon: The Australian Cyber Security Centre .................. 4 Catch, Patch, Match...................... 4 www.onsecure.gov.au ASD Contact Details For non-urgent and general ICT security enquiries: Email: asd.assist@defence.gov.au For urgent and operational government ICT security matters: Phone: 1300 CYBER1 (1300 292 371) select 1 at any time OR Complete the cyber security incident report form at www.asd.gov.au Reporting incidents helps ASD to: • understand threats to Australia government systems • inform other threatened agencies • develop defensive policy and practices Page 1 Avoid being caught in a pinch overseas Travelling overseas with an electronic device can make travel easier and more convenient, but it also carries security risks that all individuals need to consider. In particular, Government employees should be aware that the compromise of your device could have an impact on your department, its information and its reputation. Claire from the Department of the Prime Minister and Cabinet went on a private trip overseas in mid-2012. Before she left, her ICT security team proactively briefed her on the personal security of her mobile devices while she was away. They instructed her to keep her phone on her person at all times and gave her a list of things to look out for that may indicate a compromise. • Remove all non-essential data from the device, particularly sensitive information. • Disable any feature or software not required for the trip. This will limit software vulnerabilities. • Disable Bluetooth and wireless capabilities and any features that allow the device to ‘auto-join’ a network. • Ensure strong passwords are used. • Back up all your data before you travel. If your device is compromised you may not be able to recover it. Upon her return, Claire started to notice her phone had a significantly shorter battery life than usual and wasn’t performing as reliably as it previously had. These were consistent with the signs of a malware compromise that she had been warned about. She sought advice and her ICT security team directed her to restore her phone to factory settings and change her passwords on all email based accounts. “I had followed all advice apart from a 10-20 minute window when I left my phone in my hotel room while I popped down the hall. I also used my phone once or twice to connect to hotel wireless networks to check personal emails…Next time I will be even more vigilant than I was this time around!” Claire’s experience highlights the risk to security when you travel overseas with an electronic device. This risk is elevated when Government information is stored or communicated on that device. While you are travelling it is your responsibility to ensure your information remains secure. ASD’s Travelling overseas with an electronic device outlines steps you can take before, during and after your travel to maximise the security of your device and the information stored on it to help mitigate against scenarios such as Claire’s. Before you travel • Consult your ICT security staff to ensure updates, patches, encryption and antivirus software are installed on your device. Check if there are emergency information sanitisation procedures. • If you are provided with an agency device such as a laptop, check what restrictions there are on its use. Issue #11 – August 2013 While you are travelling • Maintain physical control over devices by keeping them in your possession and not checking them in as luggage. • Do not connect to open Wi-Fi networks, only wireless communications that are needed and can be secured should be enabled. Make use of your agency Virtual Private Network to use the internet to ensure your browsing traffic is protected. • Do not store or communicate information above the classification of the device. • Avoid using non-agency controlled web-based email services for business purposes. • Clear your web browser after each use, including deleting history files, cache, cookies, URL and temporary internet files. • Avoid connecting USB devices or playing illegitimate CDs and DVDs on your agency laptop. Page 2 When you return • Advise your ICT security team if the device was taken out of your possession or if you left it unattended in your hotel room at any point. They will be able to check the device for any malicious software or evidence of compromise. • All passwords associated with a mobile device should be changed upon return from overseas travel. By following these steps you can reduce the risks of travelling overseas with an electronic device. In Claire’s case, the diligence of her ICT security team meant that the potential harm caused by the compromise of her mobile phone was very limited and the risk to government low. For more information see ASD’s Protect publication Travelling overseas with an electronic device (December 2012). Think before you BYOD Bring Your Own Device (BYOD) programs are becoming increasingly popular as government and businesses adopt flexible working trends and employees require greater mobility. ASD regards BYOD as a subset of enterprise mobility. Enterprise mobility is about enabling employees to perform work in specified business-case scenarios using devices such as smartphones, tablets and laptops and technologies that facilitate remote access to data. A well implemented enterprise mobility scheme can provide greater freedom, convenience and flexibility for employees, and enables organisations to take advantage of new technology faster, reduce hardware costs and improve productivity. However, these schemes also carry risks to security which must be considered and mitigated against. In June, ASD released a new guide titled Risk Management of Enterprise Mobility Including Bring Your Own Device. This guide provides advice on how to implement enterprise mobility in your organisation with due consideration of business opportunities, compliance obligations, personnel resources, budget limitations, and security risks. ASD aims to help you understand the security risks, and how to manage them, in the mobility space. These can be summarised in the four ‘P’s of enterprise mobility: purpose, planning, policy and polish. The first step is establishing a purpose. Organisations need to have a strong business Issue #11 – August 2013 case to establish an enterprise mobility scheme. Consider the benefits, the risks, and the resources that will be required, and whether enterprise mobility will enhance users’ ability to do business. The second step is planning. It is crucial you take the time to get this right. You need to consider the different options available and make an informed risk-based decision. Once you have decided who you are trying to ‘make mobile,’ the next questions should be what information do they need access to, and how are they going to access it. The third step is to develop and communicate your policy. This includes education and training on what data can be accessed, stored and communicated to which devices and by which applications. A key aspect of this stage is your acceptable use policy. This is what communicates your expectations on employee behaviour, including what risk management controls they need to apply on your behalf. Finally, you need to continually polish your program and review your usage policies where required. This is more than just ongoing management and technical support and requires monitoring of the scheme, including by reviewing various logs. You need to have regular reporting to senior management to help them understand and address unacceptable risks. This will allow senior management to assess whether the benefits of enterprise mobility to the organisation justify the risks and costs. JUNE 2013 Risk Management of Enterprise Mobility Including Bring Your Own Device If organisations take into account ASD’s guide Risk Management of Enterprise Mobility Including Bring Your Own Device they will be well on the way to establishing an efficient and secure enterprise mobility scheme. This publication and further resources are available on www.onsecure.gov.au and www.asd.gov.au Page 3 Coming Soon: The Australian Cyber Security Centre In January of this year the establishment of the new Australian Cyber Security Centre (ACSC) was announced. The development of the new ACSC is an important government initiative to ensure that Australian networks are amongst the hardest to compromise in the world. The ACSC will be located in a state-of-the-art facility within the new Ben Chifley Building in Canberra, also home to ASIO headquarters. Importantly, it will create a hub for greater collaboration with the private sector, state and territory governments, and international partners, to combat the full breadth of cyber threats – a genuinely new and unique national capability. ASD’s Head of Cyber and Information Security, Major General Stephen Day, recently addressed the Australian Defence Magazine (ADM) Cyber Security Summit stating: “ ASD will continue with the central role we currently play in cyber security. ASD will provide the majority of the staff, about 73%, and the bulk of the capability, for the new centre. And, reflecting the majority contribution of ASD, an ASD officer will be the centre’s coordinator. I will be the first incumbent. The centre will build upon the fusion model of the current CSOC. It will combine the cyber security capabilities from ASD, ASIO, the Attorney-General’s Department, the Australian Federal Police and the Australian Crime Commission in a single location. I know there is some confusion out there about who in government is responsible for what in cyber. One of my intentions is that the centre will represent a one-stop shop for cyber security, 1800 CYBER if you will. Behind the shop front we will work out who is best positioned to deal with the issue at hand. ” The full speech to the ADM Cyber Security Summit is available on the Media Room section on the ASD website. Catch, Patch, Match In April 2013, the Top 4 Strategies to Mitigate Targeted Cyber Intrusions became mandatory for Australian Government agencies under the Protective Security Policy Framework (PSPF). The new mandatory requirement in the PSPF recognises the effectiveness of the Top 4 strategies in mitigating targeted cyber intrusions. The Top 4 strategies can be summarised as Catch, Patch, Match: CATCH malicious software with a whitelist; PATCH applications and operating systems; and MATCH the right people with the right access. TOP 4 STRATEGIES So what does it all mean? Issue #11 – August 2013 malicious software with a whitelist. mitigates at least your applications and operating system. the right people with the right privileges. of targeted cyber intrusions Page 4 CATCH Malicious software (commonly referred to as ‘malware’) can execute on your computer without you even knowing that it’s on your system. One of the most effective ways to stop this happening is to use an application whitelist, so that only specifically selected programs can run on your system. This can prevent malicious and unauthorised software from executing. Application whitelisting has the advantage of not requiring daily definition updates, and allows the administrator to control which programs can be run on the network. PATCH Patching your applications and operating systems is vital in preventing attackers from exploiting your network. A patch is a small piece of software designed to update a program or fix problems. You may have noticed automatic software updates running on your home PC – these are important in making sure that your application and operating system are up to date and protected against current threats. It is important to patch your organisation’s systems to protect your most critical assets and data. MATCH So why is it so important to match the right people with the right access? It’s time to look at your network and check whether every user with administrative privileges needs to have them. It may not seem important, but limiting administrative privileges is a critical part of helping to stop malware from spreading, hiding in your network, and compromising your system. The more users with administrative privileges, the greater the risk when one of those users is compromised. Accounts that grant a high level of access should be restricted to only those users that need them. How does it all work? When used as a package, the Top 4 mitigation strategies help in achieving a ‘defence-in-depth’ ICT system. The Top 4 strategies enable multiple lines of defence which can help prevent low to moderately sophisticated cyber intrusions. Spearphishing is the most common intrusion technique seen by ASD’s Cyber Security Operations Centre (CSOC). A socially engineered e-mail can contain an attachment in a common format (for example, a PDF or JPEG) that can exploit a vulnerability once the user opens it. If the application with the vulnerability has been patched, the malware will not be able to exploit that vulnerability. If the application (or operating system) has not been patched, the malware can still be prevented from executing if there is an application whitelist stopping the program from running. If the system is compromised and the user does not have unnecessary administrative privileges, attackers will not have such a high level of access to the system. At least 85% of the cyber intrusion techniques responded to by ASD could have been mitigated by implementing Catch, Patch, Match as a package. Want more info? For more information on the Top 4 and the Strategies to Mitigate Targeted Cyber Intrusions, please visit www.asd.gov.au. So what’s the best way to do this? 1.Identify the tasks which absolutely require administrative privileges to be performed, and the staff who are required (and authorised) to carry out these tasks. 2.Create separate administrative accounts for those staff, with the least level of privilege that is required for them to complete the tasks that require administrative access. 3.Ensure that these administrative accounts do not have the ability to access the internet or read email. If possible, ensure that administrative access is performed on a separate computer that is used for day-to-day tasks. Issue #11 – August 2013 1 2 3 4 Page 5