Notes
"A" in APT is not for advanced threat, but rather an advanced adversary.APTs almost always come in via email using one of these four vectors:
- attached executable
- macros (office)
- active scripting
- html embedded content
So, do we really need these to come in via email? Almost never, so disable these to significantly reduce risk from APTs.
Malware usually does these things
- Upload code
- Start a process
- Establish connection
- Modify startup or sytem files
Can use an outbound proxy. It will break most command and control connections.
Organizations aren't detecting attacks. Need to shift mentality to one that assumes we are going to get compromised, so figure out how to detect and neutralize compromises.
Much like the APT webinar, he suggests looking at your network diagram and identifying all of the preventative devices and the detective devices. The average is 88% preventive. All the effort is on prevention and little to none on detection. Need to start focusing more on detection. Also 95% of the prevention is on inbound.
Prevention is ideal, but detection is a must!
Suggestions
- Know your systems
- up-to-date network diagram
- network visibility map
- cm and change control
- Defense in depth
- inbound prevention
- outbound detection
- log correlation
- anomaly detection
- Common metrics
- utilize the critical controls
- security defines the metrics
- IT implements the metrics
- audit validates the metrics
- executives track the metrics
No comments:
Post a Comment