Overview
APT is like cancer vs. the common cold threat of a few years ago. Should think in terms of you are already infected, now go find it. Despite best efforts, we will still get infected.Advanced = advanced adversary. Another interpretation of APT = average phishing technique. Adversaries are going to used the easiest method that they can to break in. I.e. phishing. Usually buried in an attachment so you get compromised without even knowing. That is the persistent part.
Too much focus on presentation and not enough on detection.
Solutions
Most dangerous applications are web browsers and email clients. So sandbox/VM those applications.3 Primary vectors
- Executable content in email
- Macros in an office document
- Executable code in embedded HTML in the email
Prevention vs. Detection
Prevention will eventually fail, so need to also have detection. This will allow you to detect a breach after it gets through prevention and then stop it. Organizations have to focus more on detection. Most security is preventative (85%) vs. detective (15%), and most of it is on inbound vs. outbound. Need to examine outbound traffic to spot unusual activity.Encrypted outbound traffic can sneak past detection. Need to load crypto modules to decrypt, but if adversary controls keys, then that won't work. Solution - create crypto free zones. That is from understanding adversary and their strength, then turning it into a weakness.
5 Steps to Secure Future
- Identify Critical Data - can't protect what you don't know. Determine your most important assets, biggest threats, and biggest vulnerabilities. Get a unified focus from everyone. Risk Based Thinking improves results. Questions to ask:
- What is the risk?
- Is it the highest priority?
- Is it the most cost effective way to reduce risk?
- Align the defense with the offense. Most attacks follow these five steps. Most effort is spent defending steps 3 and 4. If you do enough reconnaissance and scanning, then exploitation is fairly easy.
- Reconnaissance
- Scanning
- Exploitation
- Create backdoors
- Cover tracks
- Know your organization. If offense knows more than defense, then they will win. You need to have:
- Accurate network diagram - can't protect what you don't know about
- Network visibility map
- CM and change control
- Defense in depth. There is no unstoppable adversary.
- Inbound protection
- Outbound detection
- Log correlation - look at IP address destination countries
- Anomaly detection
- Common Metrics. Use the critical controls
- Offense informing the defense
- Automation and continuous monitoring of security
- metrics to drive measurement and compliance
No comments:
Post a Comment