ntxissacsc4 - intellectual property protection― cross roads between ethics, information security,...

41
“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.” - Bruce Schneier

Upload: north-texas-chapter-of-the-issa

Post on 16-Apr-2017

441 views

Category:

Internet


1 download

TRANSCRIPT

Page 1: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

“Ifyouthinktechnologycansolveyoursecurityproblems,thenyoudon’tunderstandtheproblemsandyoudon’tunderstandthetechnology.”

- BruceSchneier

Page 2: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

IntellectualPropertyProtection―CrossRoadsbetweenEthics,Information

Security,andInternalAudit

Mr.RickBrunner,CISSPApplicationSecurityArchitect

GMFinancial

Page 3: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

Disclaimer

Theviews,thoughts,claims,oropinionsinthispresentationaresolelythoseofthepresenter.

Nothinginthispresentationrepresentstheviews,thoughts,claims,oropinionsofGMFinancial,UnitedStatesAirForce,theAirForceReserves,theDepartmentofDefense,ortheIntelligenceCommunity.

Page 4: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

Objectives

• RecognizetheimpactandcostofIntellectualPropertyExfiltration

• Identifytheissuesofre-usingworkproducts• DiscusstechniquesinmitigatingthreatstoanOrganization’sIntellectualProperty

Page 5: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

IntellectualObjects• Theexpressionintellectualobjects referstovariousformsofintellectualproperty

• Intellectualpropertyconsistsof“objects”thatarenottangible

• Non-tangibleor"intellectual"objectsrepresentcreativeworksandinventions,i.e.,themanifestationsorexpressionsofideas

Page 6: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

IntellectualPropertyProtectionSchemes

• Copyrightlaw• Patents• Trademarks• Tradesecrets

Page 7: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

TradeSecrets

• AtradesecretisdefinedasInformationusedintheoperationofabusinessorotherenterprisethatissufficientlyvaluableandsecrettoaffordanactualorpotentialeconomicadvantageoverothers

• Tradesecretscanbeusedtoprotect– Formulas(suchastheoneusedbyCoca-Cola)– Blueprintsforfutureprojects– Chemicalcompounds– Processofmanufacturing

Page 8: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

ValueofIntellectualPropertyComponentsofS&P500MarketValue

0

20

40

60

80

100

120

1975 1985 1995 2005 2009

IntangibleAssets

TangibleAssets

Source:OceanTomo

Page 9: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

TheLandscape

Page 10: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

TheActors• External—External actors originate outside the victim

organization and its network of partners. Typically, no trust or privilege is implied for external entities.

• Internal—Internal actors come from within the victim organization. Insiders are trusted and privileged (some more than others).

• Partners—Partners include any third party sharing a business relationship with the victim organization. Some level of trust and privilege is usually implied between business partners

Source:Verizon’s2013DataBreachInvestigationsReport

Page 11: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

TheirPurpose

Source:Verizon’s2013DataBreachInvestigationsReport

Page 12: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

VarietyofExternalActors

Source:Verizon’s2013DataBreachInvestigationsReport

Page 13: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

ProfilingThreatActors

Source:Verizon’s2013DataBreachInvestigationsReport

Page 14: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

ExfiltrationAnunauthorizedreleaseofdatafromwithinacomputersystemornetworkhttp://en.wikipedia.org/wiki/Exfiltration

Source:TrendMicroIncorporated—TrendLabs SecurityinContextPaper

Page 15: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

Exfiltration— RemoteUser

Source:TrendMicroIncorporated—TrendLabs SecurityinContextPaper

Page 16: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

Ours—ReaperUAV

http://www.hightech-edge.com/mq_9-reaper-hunter-killer-deployed-combat-missions-iraq-mq_1-rq_1-predator/2488

Source:Mandiant Overview--“State-of-the-Hack”

Page 17: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

Theirs—ChinaDragonUAV

http://www.sinodefenceforum.com/air-force/chinese-uav-ucav-development-24-3526.html

Source:Mandiant Overview--“State-of-the-Hack”

Page 18: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

OurF-22,TheirJ-20

http://aviationintel.com/wp-content/uploads/2011/05/j20f22comp.jpg

Page 19: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

NotableOthers

RSA Hacked Via Recruitment Plan

OperationAurorahttp://www.pcmag.com/article2/0,2817,2391951,00.asp

http://en.wikipedia.org/wiki/File:IllegalFlowerTribute1.jpg

Page 20: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

Exfiltration—TheEmployee

Page 21: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

InsiderThreatCaseDatabase

Source:CommonSenseGuidetoMitigatingInsiderThreats,4thEditionhttp://resources.sei.cmu.edu/library/asset-view.cfm?assetid=34017

Page 22: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

CasesinThreeMajorCrimeTypesbySector

Source:CommonSenseGuidetoMitigatingInsiderThreats,4thEditionhttp://resources.sei.cmu.edu/library/asset-view.cfm?assetid=34017

Page 23: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

AssetAttacked

Source:AnAnalysisofTechnicalObservationsinInsiderTheftofIntellectualPropertyCaseshttp://repository.cmu.edu/cgi/viewcontent.cgi?article=1660&context=sei

Page 24: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

How

Other methods?

Page 25: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

AnAnalysisofTechnicalObservationsinInsiderTheftofIntellectualPropertyCaseshttp://repository.cmu.edu/cgi/viewcontent.cgi?article=1660&context=sei

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Customerinformation

Sourcecode Businessplans Tradesecrets Internalbusiness

information

Proprietarysoftware

E-mail

Remotenetworkaccess

File/datatransfer

Downloadedtopersonallaptop

Removablemedia

Hostunknown

Theftofprinteddocuments

ExfiltrationBreakdown– AssetTargeted

Page 26: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

Case1– LockheedMartinvBoeingLockheedMartinemployeewenttoBoeingin1999fora7.5%raise• LockheedMartinIntellectualPropertywentaswell• Employeeofferedtobringtheentirerocketproposalwith

ifhired(Disputed)• Boeingpersonnelwentthroughethicstraining• Boeinglegal-triggeredcallstoLockheedMartinandthe

AirForceinformingthemthatsevenpagesofharmlessdatahadbeenfoundandonlyviewedby2people

• 2003AirForceinvestigationconcludedthatBoeingwasinpossessionofover22,000pagesofLockheedMartinconfidentialandproprietarymaterial

Page 27: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

Case2– DeputyAssistantSecretary(DAS)oftheAirForceforAcquisitionandManagement

PrincipalDASoftheAirForceforAcquisitionandManagement• DASawardeddozensofcontractstoBoeingfrom2000-2002,

aswellascontroversial$23billionprocurementforleasingArielrefuelingtankers

• Boeinghiredtheirrelativewhilestillinoffice• Boeingofferedthemapositionafterleavingcurrentposition• Boeing’sCFOandformerDASpleadedguiltytoviolationsof

theconflictofintereststatues• DASadmittedthatBoeing’sfavorsinhiringrelativesand

pendingemploymentofferinfluencedcontractingdecisions

Page 28: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

Result• Individualswerefired• LockheedMartinfiledacivilsuiteagainstBoeing• UndersecretaryoftheAirForcestrippedBoeingofseven

launchesworth$1billionandreallocatedthemtoLockheedMartin

• DOJandCongressionalInvestigation,Decision(6/30/2006)– $615millioninfines

• $565millioncivilsettlement• $50millionmonetarypenaltyforseparatecriminalagreement

– Boeingacceptedresponsibilityforitsemployees• Continuedcooperationwithfederalinvestigators• Maintainedaneffectiveethicsandcomplianceprogram,withparticularattentioninhiringformergovernmentofficialsandhandlingcompetitorinformation

• Receiveda20-monthsuspensionof3businessunitsfromGovernmentcontracting

Page 29: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

http://www.iplawalert.com/uploads/file/WP_WhatsYoursIsMine-HowEmployeesarePuttingYourIntellectualPropertyatRisk.pdf

TopReasonsEmployeesBelieveItIsAcceptabletoTakeCorporateData

Key Findings• Employees are moving Intellectual Property outside the company in all directions• When employees change jobs, sensitive business documents often travel with them• Employees are not aware they are putting themselves and their companies at risk• They attribute ownership of Intellectual Property to the person who created it• Organizations are failing to create a culture of security

Page 30: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

PercentageWhoSayaSoftwareDeveloperShouldHavetheRighttoRe-UseCodeforAnotherCompany

http://www.iplawalert.com/uploads/file/WP_WhatsYoursIsMine-HowEmployeesarePuttingYourIntellectualPropertyatRisk.pdf

Page 31: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

Takeaways• Insiderthreatsareinfluencedbyacombinationof

– Organizational– Behavioral– Technicalissues

• Management,humanresources,informationtechnology,softwareengineering,legal,informationsecurity,internalauditandthecriticaldata“owners”– Understandtheoverallscopeoftheproblem– Communicateittoallemployeesintheorganization.

Page 32: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

'Securityisanotaproduct,butaprocess.'It'smorethandesigningstrongcryptographyintoasystem;it'sdesigningtheentiresystemsuchthatallsecuritymeasures,includingcryptography,worktogether. —

BruceSchneier

Page 33: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

CanInsidersbeStopped?• ItDepends--Stoppingthemisacomplexproblem• Prevented/mitigatedthroughalayereddefensestrategyconsistingof

– Policies– Procedures– Technicalcontrols

• Paycloseattentiontomanyaspectsoftheorganization,including– Organizationalculture– Businesspoliciesandprocedures– Technicalenvironment

• Lookbeyondinformationtechnologytotheorganization’soverallbusinessprocessesandtheinterplaybetweenthoseprocessesandthetechnologiesused

Source:CommonSenseGuidetoMitigatingInsiderThreats,4thEditionhttp://resources.sei.cmu.edu/library/asset-view.cfm?assetid=34017

Page 34: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

OrganizationCulture• Leadbyexample• Createapositivework

environment• Anticipateandmanage

negativeworkplaceissue• Createananonymous

reportingsystem• Knowyourassets• Clearlydocumentand

consistentlyenforcepoliciesandcontrols

Source:See“References”slide

Page 35: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

OrganizationCulture(Continued)

• Beginningwiththehiringprocess,monitorandrespondtosuspiciousordisruptivebehavior

• Developaformalizedinsiderthreatprogram

• Beespeciallyvigilantregardingsocialmedia

Source:See“References”slide

Page 36: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

BusinessPoliciesandProcedures• Performregular(and

unscheduled)Audits• Haveuniformdataclassification

andprivacyscheme• Incorporateinsiderthreat

awarenessintosecurityawarenessandtrainingforallemployees

• Enforceseparationofdutiesandleastprivilege

• Developacomprehensiveemployeeterminationprocedure,includingdeactivatingallknownsystemandapplicationaccess

Source:See“References”slide

Page 37: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

BusinessPoliciesandProcedures(Continued)

• Institutionalizesystemchangecontrols• Institutestringentaccesscontrolsand

monitoringpoliciesonprivilegedusers• Implementstrictpasswordand

accountmanagementpoliciesandpractices

• Considerthreatsfrominsidersandbusinesspartnersinenterprise-wideriskassessments

• Defineexplicitsecurityagreementsforanycloudservices,especiallyaccessrestrictionsandmonitoringcapabilities

• Developaninsiderincidentresponseplanandinvestigateeveryincident

Source:See“References”slide

Page 38: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

TechnicalEnvironment

• Implementinternalcontrolscommensuratewiththesensitivityofthedataorinformation

• Implementsecurebackupandrecoveryprocesses

• Trackandsecurethephysicalenvironment

• Monitorandcontrolremoteaccessfromallendpoints,includingmobiledevices,anduselayereddefenses

Source:See“References”slide

Page 39: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

TechnicalEnvironment(Continued)

• Usecentralizedloggingandcorrelationcapabilitytologandmonitoremployee,application,system,andnetworkactions

• Establishabaselineofnormalnetworkdevicebehavior

• Closethedoorstounauthorizeddataexfiltration

• Considerinsiderthreatsinthesoftwaredevelopmentlifecycle

Source:See“References”slide

Page 40: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit

References• CommonSenseGuidetoMitigatingInsiderThreats,4thEdition

http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=34017

• EightTipsToPreventEmployeeTheftandFraudhttp://www.allbusiness.com/prevent-employee-theft-fraud/16704398-1.html

• What'sYoursisMine:HowEmployeesarePuttingYourIntellectualPropertyatRiskhttp://www.iplawalert.com/uploads/file/WP_WhatsYoursIsMine-HowEmployeesarePuttingYourIntellectualPropertyatRisk.pdf

• DataDiscoveryandClassificationinFiveEasyStepshttp://trendedge.trendmicro.com/pr/tm/te/document/DLP_Data_Discovery_and_Classification_in_5_Steps_090630.pdf

• TheCERT®GuidetoInsiderThreatsHowtoPrevent,Detect,andRespondtoInformationTechnologyCrimes(Theft,Sabotage,Fraud)ISBN-13:978-0-321-81257-5,ISBN-10:0-321-81257-3

Page 41: NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, Information Security, and Internal Audit