incident response to a breach: right of boom you find...

21
Incident response to a breach: Right of boom you find ashes Dr. Samuel Liles http://selil.com Opinions, or other information expressed are presenters and do not reflect current, former, future, or unaffiliated employers opinions or policies.

Upload: others

Post on 27-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Incidentresponsetoabreach:Rightofboomyou

findashesDr.SamuelLileshttp://selil.com

Opinions,orotherinformationexpressedarepresentersanddonotreflectcurrent, former,future,orunaffiliatedemployersopinionsorpolicies.

Page 2: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Agenda

• Scope• Cybery thoughts• Throughthelensofrisk• Threats• Vulnerabilities• Frameworks• NCIRP• Attribution• Future

Randomimageofftehwebz

4/18/16 2

Page 3: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Scope,asinassumptions• Youcanhavetheweeds,thefield,orthestadium.Choose1.

• You’reinagraduatecoursesoyoualreadyknowhowtomowthe lawnandtakecareoftheweeds.

• Goalistoanswerwhattheheckhappens inamajorcyberincident.

• Everyincident isdifferentbuteveryincident followsapattern.

• Everystadiumhasadifferentteambuteverysporthasrules.

• Bewaryofplayinggolfwiththehockeyteam.• Lotsofpeople arecomfortablepullingweeds.• Youcan’tpullweedsfastenoughtowinthegame.

Source:http://www.blu-ray.com/mov ies/Happy-Gilmore- Blu-ray /1677 1/

4/18/16 3

Page 4: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Justbecause….Cyber.

• Lotsofdefinitions• Umbrella termforactivitiestoincrease coordination,collaboration, andunderstanding<break ricebowls>

• Mydefinition:Theterm“cyber”itselfdenotesahumancognitivecentricconceptthatdealswiththedisintermediationoftechnologycenteredwithinhumanactivity.

Randomimageofftehwebz

4/18/16 4

Page 5: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

4/18/16 5

Page 6: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

CopyrightswithcaveatsSamuelLiles©

4/18/16 6

Page 7: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

CopyrightswithcaveatsSamuelLiles©

Threat?

4/18/16 7

Page 8: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Source:EnergySectorSpecificPlanhttps://www.dhs.gov/xlibrary/assets/nipp-ssp-energy-2010.pdf

Vulnerability?

4/18/16 8

Page 9: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

CopyrightswithcaveatsSamuelLiles©4/18/16 9

CopyrightswithcaveatsSamuelLiles©

Page 10: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Boom

PersistencePrivilegeEscalation

DefenseEvasion

CredentialAccess

HostEnumeratio

n

LateralMovement

Execution C2 Exfiltration

CommandandControlInstallationExploitation

Reconnaissance Weaponization Delivery

Actions onObjective

PreparationEngagemen

tPresence Effect/Cons

equencesDNIFramework

Cyber Kill Chain

MITREATT&CK

NSATAO Reconnaissance Initial Exploitation Establish Persistence Install ToolsMoveLaterally

Collect

Exfil

Exploit

CopyrightswithcaveatsSamuelLiles©

4/18/16 10

Page 11: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

ISO/IEC27035:2011providesastructuredandplannedapproachto:1.detect,reportandassessinformationsecurityincidents;2.respondtoandmanageinformationsecurityincidents;3.detect,assessandmanageinformationsecurityvulnerabilities;and4.continuouslyimproveinformationsecurityandincidentmanagementasaresultofmanaginginformationsecurityincidentsandvulnerabilities.

Preparation, identification, containment, eradication, recovery, and lessons learned.

Incident triage, incident coordination, incident resolution

ISO/IEC27035:2011:InformationSecurityIncidentManagement

SANS:CreatingandManaginganIncidentResponseTeam

RFC2350:ExpectationsforComputerSecurityIncidentResponse

CERT: Handbook for Computer Security Incident Response Teams (CSIRTs)

NIST800-61:ComputerSecurityIncidentHandlingGuide

4/18/16 11

Page 12: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Source: NationalCyberIncidentResponsePlanInterim(2010)http://www.federalnewsradio.com/wp-content/uploads/pdfs/NCIRP_Interim_Version_September_2010.pdf

4/18/16 12

Page 13: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Source: NationalCyberIncidentResponsePlanInterim(2010)http://www.federalnewsradio.com/wp-content/uploads/pdfs/NCIRP_Interim_Version_September_2010.pdf

Dr.Andy Ozment

4/18/16 13

Page 14: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Source: NationalCyberIncidentResponsePlanInterim(2010)http://www.federalnewsradio.com/wp-content/uploads/pdfs/NCIRP_Interim_Version_September_2010.pdf

Mr.John Felkerhttps://www.dhs.gov/national-cybersecurity-and-communications-integration-center

Mr.BradNixhttps://www.us-cert.gov

Mr.MartyEdwardshttps://ics-cert.us-cert.gov

4/18/16 14

https://www.us-cert.gov/nccic/ncc-watch https://www.dhs.gov/office-intelligence-and-analysis

Page 15: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Whoisincharge?TheexactcompositionoftheCyberUnifiedCoordinationGroup(UCG)IncidentManagementTeam(IMT)willbedetermined bytheAssistantSecretary forCyberSecurityandCommunications (CS&C)basedonthenatureandscopeoftheincident,andwillalwaysinclude• ASeniorDefense Official• ASeniorFederalLawEnforcement Official• ASenior IntelligenceCommunity(IC)Official• SeniorPrivateSectorOfficial(s) (chosenbasedonthespecificnatureoftheincident)

• OtherCyberUnifiedCoordinationGroup(UCG)SeniorOfficialswithprimarystatutoryorjurisdictional responsibilityandsignificantoperational responsibilitychosenbasedonthenatureoftheincident;

• SeniorOfficialsmaybechosen fromdepartments, agencies, andorganizationswithcapabilities,authorities, andresponsibilities relevanttotheincident.

Source: NationalCyberIncidentResponsePlanInterim(2010)http://www.federalnewsradio.com/wp-content/uploads/pdfs/NCIRP_Interim_Version_September_2010.pdf

Senior =SES orGO

4/18/16 15

Page 16: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Whatdotheydo?

TheAssistantSecretary forCyber SecurityandCommunications(CS&C),withthesupportoftheNationalCybersecurity andCommunications IntegrationCenter (NCCIC)andinconcertwiththeCyberUnifiedCoordinationGroup(UCG)IncidentManagementTeam (IMT),isresponsible for—

• Establishingtheincidentactionplan• EnsuringoverallcoordinationofSignificantCyberIncidentmanagementandresource

• allocationactivities• Facilitatinginteragencyconflictresolutionorelevatingmatters,asnecessary

• Coordinatingresponsebetweenmultiplecyberincidentswhenapplicable

• EnsuringtheNationalOperationsCenter(NOC)andNationalInfrastructureCoordinationCenter(NICC)receivetimelyupdatesonthestatusofresponseactivities

• Coordinatingexternalaffairsactivities.Source: NationalCyberIncidentResponsePlanInterim(2010)http://www.federalnewsradio.com/wp-content/uploads/pdfs/NCIRP_Interim_Version_September_2010.pdf

4/18/16 16

Page 17: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Source: NationalCyberIncidentResponsePlanInterim(2010)http://www.federalnewsradio.com/wp-content/uploads/pdfs/NCIRP_Interim_Version_September_2010.pdf

4/18/16 17

Page 18: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Source: NationalCyberIncidentResponsePlanInterim(2010)http://www.federalnewsradio.com/wp-content/uploads/pdfs/NCIRP_Interim_Version_September_2010.pdf

TheNCCIC, asthenational focalpoint forcyberincidentmanagementandcoordination during cyber-specificincidents,isthepointofintegrationforallinformation fromFederal departments and agencies, StateLocal,Tribal, andTerritorialgovernments, andtheprivate sectorrelatedtosituationalawareness,vulnerabilities, intrusions,incidents,andmitigation activities

This roledoes not changeexisting departments’ andagencies’ authorities ormissions; however, DHS,through theNCCIC,will coordinatewithallpartners, including lawenforcement agencies leading thenational efforttoinvestigateandprosecutecybercrime; theICregardingthreats,intelligence, andattribution;DODelementsregardingintelligence andinformationsharing,military operations todefend thehomeland; StateandLocal governments; andtheprivate sectortoensure common operational situational awareness isbeing leveragedbyallresponse organizations astheyexecutetheirindividual authorities andmissions.

4/18/16 18

Page 19: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Political

Technical

Forensic

EvidenceRequired

TimetoLevelofAttribution

EventHappens

Possible

Probable

Provable

Motive,means,opportunity

IOCs:IP,Hash,URL,method,time, etc.

Crypto,non-repudiation,multi-modesensing,direct

observation

CopyrightswithcaveatsSamuelLiles©

Page 20: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Future

• NCIRPisbeingupdatedhttp://www.afcea.org/content/?q=Blog-when-will-united-states-have-national-cyber-incident-response-plan

• Newcybersecuritypresidentialpanelappointedhttp://www.theverge.com/2016/4/13/11427182/president-obama-cybersecurity-panel-uber-microsoft-mastercard-nsa

• NPPD/NCCICistransforminghttp://www.emergencymgmt.com/safety/Phyllis-Schneck-

Interview.html

• FederalCISOmaybeappointed(interviewshappeningnow)http://www.federaltimes.com/story/government/cybersecurity/2016/02/09/obama-federal-

ciso/80032796/

4/18/16 20

Page 21: Incident response to a breach: Right of boom you find ashesselil.com/wp-content/uploads/2016/04/sam_liles_incident_response.pdf4. continuously improve information security and incident

Questions?

4/18/16 21