Cyber Policy – Thoughts and Metaphors Ivan Garcia COLSA Corporation Huntsville, AL Chief Technical Officer (Ex-Cyber VP) igarcia@colsa.com 256-964-5301 Your Data Your Customers Data Your Liability Vault History Notice the “Day Gate”…a form of layered defense Bank Vaults offer a good framework to discuss Cyber Security and Policy Vault History Recent Vault Arms-Race • Linus Yale invented the modern combination lock 1861 – But burglars learned to drill holes, use mirrors to break or….kidnap the bank manager • James Sargent (ex-employee of Yale) added the timer mechanism, the door could only be opened at certain times – Defeated the drilling approach and kidnapping only worked if you were willing to open the safe at certain times – Thieves developed tools to pry a small crack on the safe and place gunpowder to blast open the safe • Vault designers develop a way to protect against this by developing specialized grooves – Liquid Nitrogen was poured into the grooves and thieves were back in business • So it started an escalation or thicker walls with new materials that were several feet thick – Cutting torch could melt through this • Copper layer to dissipate the heat • Heat sensors • Motion detectors Physical vs. Cyber Domain Vault UL Standards • Defines equipment to be used • Defines the ‘breach’ time • Explicitly states what conditions this standard will not apply (explosives or cutting torch) • Defines related standards such as ‘lock picking’, time lock and other characteristics UL-608 Burglary Resistant Modular Vaults and Vault Doors Rating Time to Breach Vault Class M 15 minutes Class I 30 minutes Class II 60 minutes Class III 120 minutes Vaults Shifted to a Risk-Management Framework Key Thoughts… • We need to change our thinking about Cyber Security • We need to learn from history…physical pen testing versus cyber • You will be successfully attacked and compromised – …or you may already have been and might not be aware of it • It no longer takes a ‘nation state’ to compromise a sophisticated defense – See Sony Who Is After Us? • Script kiddies • Hackers • Professionals • Nation states Easy Access to Sophisticated Malware • There are several open toolkits to develop new ‘zero-day’ attacks – New malware that can bypass signature detection • These tools are easily used by minors without a college or professional education • StuxNet provided a robust professional framework for the community – Weapons-grade cyber attack The Bar has Been Significantly Lowered in the Past 5 Years “Nation State” Level Tools are Available Today to Everyone Insider Threat • Attackers have shifted focus to the employees and home users – – – – Phishing Viruses Spyware Social Engineering • Using Email, peer to peer, IM, web sites, software downloads High Value Data • Protected Health Information (PHI) – First responders, Ambulatory services • Personal Identifiable Information (PII) – Citizen records, Utility and water records – Criminal records, sheriff departments • Credit card numbers – – – – Property tax payments Traffic and court fees Utility bills, water, power Vehicle registration • Bank account / payroll information Example (Target) • Used weak security at HVAC company to get login name and password to Target • Tested software November 15-28 • November 30 pushed to most POS terminals Attackers HVAC Target Main Office To drop sites Encrypt and Verify Malware Memory CC Reader Defense vs. Asymmetric Threat • First cyber security is an unfair war – Defenders must be perfect – Attackers only need to get it right once. – Law enforcement often cannot tell if something happened. • Lets look at where we are at – Prevention (defense) – Detection – Attribution State of the Art in Defense • Most organizations practice defense in depth • However we are still often just reacting to events • Some times we don’t even know they are attacking Attribution – Who Is It? • Very hard problem • Device attribution vs. people attribution – Easier to identify a device than the person – Often attacks come from place where information is hard to get • Many technologies allow users to hide – Proxy servers – The Onion Router (TOR) • Need forensics – Network – Computer Principles of Information Security Management • Include the following characteristics that will be the focus of the current course (six P’s): – Planning – Policy – Programs – Protection – People – Project Management http://csrc.nist.gov/publications/PubsTC.html Departing Thoughts We need to move away from the ‘gear-up’ mentality in cyber security – You probably do not need any more defense ‘layers’ than a normal defensive posture – Focus on process, review security logs and develop a proficient staff to do so at least daily • Beware of insider threat…how would you distribute these tasks? • Checking account…how often would you check your checking account for expected large transactions? – Technology is not enough… • We need to focus on regular reviews of our systems in light of the evolving threat NIST Risk Management Framework Starting Point FIPS 199 / SP 800-60 SP 800-37 / SP 800-53A MONITOR Security Controls Continuously track changes to the information system that may affect security controls and reassess control effectiveness CATEGORIZE Information System Define criticality /sensitivity of information system according to potential impact of loss SP 800-37 FIPS 200 / SP 800-53 SELECT Security Controls Select baseline (minimum) security controls to protect the information system; apply tailoring guidance as appropriate SP 800-53 / SP 800-30 AUTHORIZE SUPPLEMENT Information System Security Controls Determine risk to agency operations, agency assets, or individuals and, if acceptable, authorize information system operation Use risk assessment results to supplement the tailored security control baseline as needed to ensure adequate security and due diligence SP 800-53A ASSESS Security Controls Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements) SP 800-70 IMPLEMENT Security Controls Implement security controls; apply security configuration settings SP 800-18 DOCUMENT Security Controls Document in the security plan, the security requirements for the information system and the security controls planned or in place