PPT Version

advertisement
Requirements for Format for
INcident data Exchange (FINE)
draft-ietf-inch-requirements-00.txt
INCH WG, IETF56
March 19, 2003
Yuri Demchenko <demch@nlnetlabs.nl>
Glenn Mansfield Keeni <glenn@cysols.com>
Outlines







Issues to discuss: Summary of discussion on INCH mailing list
Terminology
FINE purpose and Operational model
General requirements
Communication requirements
Format requirements
Security issues
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_2
Summary of INCH List discussion - Issues to discuss
 Name of the format: IODEF vs FINE
 Purpose of the format

Plus description/data object vs message
 Operational model
 Terminology
 Incident information aggregation

In particular, to preserve information for statistical purposes
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_3
FINE Requirements - draft-ietf-inch-requirements-00.txt
1. Introduction
2. Incident Handling Framework
2.1. Incident Description Terms
2.2 The Operational Model
3. The Goal
4. General Requirements
5. Format Requirements
6. Communication Requirements
7. Content Requirements
8. Security Considerations
Is section on requirements to IHS or processing environment
needed?
Incident object Description and Exchange Format
©2000. Yu.Demchenko. TERENA
Slide2_4
FINE/IODEF Purpose
The purpose of the Format for INcident report Exchange (FINE) is to
facilitate the exchange of incident information and statistics among
responsible Computer Security Incident Response Teams
(CSIRTs) and involved parties for reactionary analysis of current
intruder activity and proactive identification of trends that can lead
to incident prevention.
Old: A common and well-defined format will help in exchanging,
retrieving and archiving Incident Reports across organizations,
regions and countries.
New: A common and well defined format will help in exchanging
information about incident information across organizations,
regions and countries.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_5
IODEF Purpose (historical – 2000-2002)
A uniform incident classification enables applications such as:
 uniform statistic generation and exchange, for both domestic use and exchange
of data between teams. Over time a distributed incident statistics infrastructure
can evolve
 trend-analyses for reoccurrence of incidents, victims, attackers, etc.
 trend-analyses for relations between scans and attacks and thus begin working
on pro-active incident response
 uniform internal incident storage
 incident handling between teams made easier (only one team needs to classify
and analyze the complete incident, the other team can re-use this data)
 uniform incident reporting by victims to CSIRTs
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_6
2.1 Incident Description Terms
• Incident
• Event
• Damage
• Impact
•
•
•
•
•
• CSIRT
• Incident Report
• Incident Handling System
Attack
Attacker
Evidence
Target
Victim
• Other terms:
• alert, activity, IDS, Security Policy, etc.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_7
Incident and Security Event
2.1.8 Incident
An Incident is a security event that involves a security violation. An
incident can be defined as a single attack or a group of attacks that
can be distinguished from other attacks by the method of attack,
identity of attackers, victims, sites, objectives or timing, etc.
In the context of FINE, the term Incident is used to mean a Computer
Security Incident or an IT Security Incident.
2.1.5. Event
An action directed at a target which is intended to result in a change of
state (status) of the target. From the point of view of event origination,
it can be defined as any observable occurrence in a system or
network which resulted in an alert being generated. For example,
three failed logins in 10 seconds might indicate a brute- force login
attack.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_8
Attack
2.1.1. Attack
An assault on system security that derives from an intelligent threat, i.e.,
an intelligent act that is a deliberate attempt (especially in the sense
of a method or technique) to evade security services and violate the
security policy of a system.
Attack can be active or passive, by insider or by outsider, or via attack
mediator.
Proposed:
Attack can be active, resulting in the alteration of data, or passive, resulting in
the release of data, by an actor.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_9
Attacker -> Actor
2.1.2 Attacker
Attacker is individual who attempts one or more attacks in order to
achieve an objective(s).
For the purpose of FINE attacker is described by its network ID,
organisation which network/computer attack was originated and
physical location information (optional).
New:
2.1.2 Actor
Actor can be defined as who or what may violate the security requirements
(confidentiality, integrity, availability) of an asset. Actors can be from inside
or outside the organization.
Sort out between Actor, Attacker and Victim
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_10
Impact + Damage -> Impact
2.1.4. Damage: An intended or unintended consequence of an attack
which affects the normal operation of the targeted system or service.
Description of damage may include free text description of actual
result of attack, and, where possible, structured information about the
particular damaged system, subsystem or service.
2.1.7. Impact: Impact describes result of attack expressed in terms of
user community, for example the cost in terms of financial or other
disruption
Recommended to combine Damage and Impact into the term "Impact",
which is what is being described by the current term "damage".
Impact can be extensible and may be defined with terms such as
financial, asset, information, organization, etc.
INCH Meeting recommendation – Impact and Damage are different
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_11
Incident Report
2.1.9. Incident Report:
Document describing in details Incident processed by CSIRT. We
distinguish general definition of Incident report that is created and
handled by CSIRT and may have internal proprietary format adopted
to local Incident handling procedures or defined by used Incident
Handling System, and Format for INcident report Exchange (FINE)
used for exchange of Incident information between CSIRTs. Definition
of the requirements to FINE is a subject of this document.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_12
Incident Handling System
2.1.10. Incident Handling System:
Incident Handling System (IHS) is used by CSIRT to handle Incidents. It
may include user interface, underlying database and may be
integrated with ticketing or customer service system. During Incident
investigation CSIRT may use specific tools, e.g. for examining log
files, mapping network addresses to Internet names and
organisations, etc., which also may be integrated into IHS. In current
document, it is suggested that IHS can produce a document in FINE.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_13
2.2 Operational model
Where is a place for internal (report/data) format and where is a place for
intended exchange format?
See ASCII picture in
©2000. Yu.Demchenko. TERENA
draft-ietf-inch-requirements-00.txt
Incident object Description and Exchange Format
Slide2_14
4. General Requirements
4.1 The definition of the Format for INcident Report Exchange (FINE)
shall reference and use previously published RFCs where possible.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_15
5. Format Requirements - i18n and l10n (5.1)
5.1 FINE shall support full internationalization and localization.
A significant part of the FINE will comprise of human-readable text.
Since some Incidents need involvement of CSIRTs from different
countries, cultural and geographic regions, the FINE description must
be formatted such that they can be presented to an operator in a local
language and adhering to local presentation formats and local naming
rules and conventions. Localized presentation of dates, time and
names may also be required.
In case, if used, the format must be able to identify the rules or
conventions that is used in the naming.
In cases where the messages contain text strings and names that need
characters other than Latin-1 (or ISO 8859-1), the information
preferably should be represented using the ISO/IEC IS 10646-1
character set and encoded using the UTF-8 transformation format,
and optionally using local character sets and encodings.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_16
5. Format Requirements - i18n and l10n (5.1)
In case when Incident information/data is received by party that may not
correctly display and process other encoding than UTF-8, or information is
exchanged between parties that priory known may not process correctly nonnative (but other than UTF-8) encoding, the elements that can carry
encoding sensitive information should marked with the special attribute
and/or necessary transformation should be applied. Use of this attribute can
initiated by sending party, or re-sending party that want to preserve specific
content.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_17
5. Format Requirements - Continue
5.2 FINE must support modularity in Incident description to allow
aggregation and filtering of data.
The structure will contain several components and some components
may be structures themselves. Each component of a structure will
have a well defined semantics.
5.3 FINE must provide the possibility for recording the evolution of
Incident Report during its whole lifetime. In particular, FINE should
contain the record of all communications that happened in course of
current Incident.
5.4 FINE must support the application of an access restriction policy to
individual components.
5.5 An FINE report must be globally uniquely identifiable.
5.6. The Format for Incident report Exchange itself must be extensible.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_18
6. Communications Mechanisms Requirements
6.1. Incident Report exchange will normally be initiated by humans using
standard communication protocols and exchange mechanisms, for
example, e-mail, HTTP, XML Web Services, FTP, etc.
FINE must not rely on communication mechanisms to satisfy
requirements of current document.
The communication mechanisms must have no bearing on the
authenticity, integrity, and confidentiality of the Incident Report itself.
Communications security requirements may be applied separately
according to local policy so are not defined by this document.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_19
7. Contents Requirements
7.1 An Incident Report will generally refer to one or more entities. The
entity may be an attacker, a victim or an observer. There are several
facets of an entity involved in an Incident Report. The entity may have
zero or more network addresses and names as well as zero or more
location names, organizational name, person names, machine names
etc. FINE should support various facets describing the entities
involved.
7.2 The Incident Report should contain the type of the attack if it's
known.
7.3 FINE must include the Identity of the creator (or current owner) of the
Incident Report (CSIRT or other authority). This may be the sender in
an information exchange or the team currently handling the incident.
7.4 The FINE should contain information about the attacker and victim, if
known.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_20
7. Contents Requirements - Continue
7.5 The FINE should contain reference to advisories corresponding to
the Incident Report, e.g. CERT/CC, CVE, and others.
7.6 The FINE should contain a detailed description of the attack that
caused the current Incident. In particular, FINE should contain
information about Attacker’s and Victim’s systems participated or
targeted in that Attack.
7.7 The FINE may contain a description of the incident in a natural
language.
7.8 The Incident Report should contain or be able to reference additional
detailed information/data related to this specific underlying
event(s)/activity, often referred as evidence.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_21
7. Contents Requirements - Continue
7.1a or 5.2a
Format for Incident information exchange should allow Incident
information aggregation (for different purposes, in particular for
statistics and risk Assessment). Rules for such aggregation should be
well defined and documented for particular implementation.
More discussion is necessary
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_22
7. Contents Requirements - Continue
7.11 Time shall be reported as the local time and time zone offset from
UTC. (Note: See RFC 1902 for guidelines on reporting time.)
Internal Incident Report may contain local presentation of time related
information, however FINE must provide unambiguous time
presentation. For event correlation purposes, it is important that the
manager be able to normalize the time information reported in the
FINE descriptions. In case when normalization of the time information
is not possible (like in case of referencing additional data about the
Incident that cannot be changed, e.g. timestamped log data), the time
offset should be mentioned.
7.12 Time granularity in FINE time parameters shall not be specified by
the FINE.
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_23
7. Contents Requirements - Continue
7.13 The Incident Report should allow application of (external)
mechanisms or assertions to assure its authenticity, integrity and nonrepudiation can be verified.
------
 Suggested use of the general XML security technology – may
be applied to any (set of) part of the document
XML Signature
 XML Encryption

 SAML (Security Assertion ML) for including AuthN/AuthZ
tokens
 XML Web Services Security for possible needs to maintain
FINE/IODEF Document status (including also security
tokens)
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_24
Any other issues
©2000. Yu.Demchenko. TERENA
Incident object Description and Exchange Format
Slide2_25
Download