računalna forenzika i automatizirani odgovor na mrežne incidente
TRANSCRIPT
i n
t e
g r
i r
a n
a s
i g
u r
n o
s t
Computer Forensic and Automated IR
Damir Delija Dr.Sc.E.E
2
Presentation plan
Introduction into computer forensic and incident response
• what it is • legal and organisational issues
EnCase approach• Arhitecture, tools, methods • approach forensic and incident response • How it is done
3
Computer Forensic – a Definition
A practical definition:
“Computer Forensics is simply the application of computer investigation and analysis techniques in the interest of determining potential legal evidence (Judd Robbins).”
4
Legal Definition of Forensics Daubert/Frye: The most important decisions governing the
use of scientific evidence in court are those of Daubert(Federal)/Frye(California).
There are four primary factors according to Daubert/Frye that should be considered before ruling on the admissibility of scientific evidence:
• Whether the theory or technique has been reliably tested;
• Whether the theory or technique has been subjected to peer review and publication;
• What is the known or potential rate of error of the method used;
• Whether the theory or method has been generally accepted by the scientific community.
5
Role of the EnCase suite EnCase Suite - Guidance Software
www.guidancesoftware.com
Central point in the system security, other usual security related tools are subordinates (feeds and actuators)
Act as standalone or as enterprise wide tool
It is supposed to react on incidents or to control system, both in same sound digital forensic way
Examiner wokstation is a workplace for incident responder, examiner, auditor, controler - all in same consitent manner, legaly acceptable
Predefined roles, ranges, users and events
Use other parts of incident response infrastructure like ticketing system, help desk, IPS, IDS, etc ...
6
Unauthorised software
Human error
Inappropriate content
Deliberate attack (hackers)
Competitors
Virus outbreaks
Regulatory compliance IP theft (eg. external consultants)
Fraud
What are our threats?
Disgruntled employeesClassifiedData leakage
Others (Unknown)
Client
7
Integrating Forensic into IR
What is an incident to you?
Virus outbreak? Stolen laptop? Inappropriate usage? Legal requirement for
electronic data? Unauthorised software? Inappropriate content? Classified data appearing in
the wrong environments? Data leakage? IP theft? Disgruntled employee?
How do you respond? Manual processes? Take Computers off the
network? Suspend Employees? External investigative
consultancy? Outsource data collection? Press release / PR? Hope and Pray? Ignore?
8
Latest analytics (1)
Who is behind data breaches? 73% resulted from external sources 18% were caused by insiders 39% implicated business partners 30% involved multiple parties
How do breaches occur? 62% were attributed to a significant error 59% resulted from hacking and intrusions 31% incorporated malicious code 22% exploited a vulnerability 15% were due to physical threats
Source: "2008 DATA BREACH INVESTIGATIONS REPORT", A Study CONDUCTED BY THE VERIZON BUSINESS RISK TEAM, 10th June 2008
9
Latest analytics (2)
What commonalities exist?
66% involved data the victim did not know was on the system
75% of breaches were not discovered by the victim 83% of attacks were not highly difficult 85% of breaches were the result of opportunistic attacks 87% were considered avoidable through reasonable
controls
Source: "2008 DATA BREACH INVESTIGATIONS REPORT", A Study CONDUCTED BY THE VERIZON BUSINESS RISK TEAM, 10th June 2008
10
Latest analytics (3)
Nine out of 10 data breaches incidents involved one of the following:
• A system unknown to the organization (or business group affected)
• A system storing data that the organization did not know existed on that system
• A system that had unknown network connections or accessibility
• A system that had unknown accounts or privileges
Source: "2008 DATA BREACH INVESTIGATIONS REPORT", A Study CONDUCTED BY THE VERIZON BUSINESS RISK TEAM, 10th June 2008
11
Reactively• We manually investigate incidents, which is time consuming
• We employ 3rd party consultancies to collect data for compliance
• We quarantine computers from the network (disrupting operations)
• We need multiple tools to investigate and solve problems
• We have to wait for our AV vendor to supply signatures for new outbreaks
Proactively• We cannot search the network for IP or other sensitive data
• We cannot search for unauthorised software or malicious code
• We cannot forensically remove data or malicious processes
• We don’t have time to investigate disgruntled employees
• We can’t identify potential risks comprehensively
How do we deal with these threats today?
15
Implement Incident Response infrastructure
Implement Encase Enterprise as a core • define additional funcionalities and plugins for Encase• trainig, testing, support, etc
Integrate it with other tools • IDS, IPS, network management, physical security, system
administration, etc...• Help Desk system, trouble ticketing system
Develop lifecycle for effcient Incident Response System
• policies, controls, reports, tests etc...• keep IR system proactive, healty and efficient
16
Anti-Forensics
Anti-forensics is any and all actions taken by an unauthorized intruder to conceal evidence
• securely deleting critical log files is considered an antiforensic technique.
discovered use of antiforensics in 39% cases this will be a trend to watch over the next years
Source:"2008 DATA BREACH INVESTIGATIONS REPORT",
A Study CONDUCTED BY THE VERIZON BUSINESS RISK TEAM
18
Incident Response Recommendations
Align process with policy Achieve “essential” then worry about “excellent” Secure business partner connections Create a data retention plan Control data with transaction zones Monitor event logs Create an incident response plan Increase awareness Engage in mock incident testing
19
IT security dependencies
IT security depends on core competencies:
• People - skill and knowledge problem
• Process - there are standards and best practices
• Technologies - control of usage and fuctions
This can be achived by • developing enterprise investigative infrastructure • use of forensics technologies as core part of IR
20
Key capabilities Covertly investigate across the network on live machines Bit level analysis able to uncover deleted and hidden data Also able to analyse volatile data in RAM Sweep enterprise for hacker code like key loggers & root kits Court validated as forensically sound Role based access control and encrypted data flow
Business benefits Respond to HR/IT requests much faster Conduct many more investigations with the same resource Rules employees in or out of investigations covertly Collects court validate evidence of wrong doing
EnCase Enterprise (EE) Platform
21
Key capabilities Can integrate directly with IDS and SIM solutions Automatically collects volatile data at point of attack or infection Threat can be killed immediately on target machine Scan and kill threat across entire network very quickly
Business benefits Acts on intelligence provided by SIM Guarantees collection of intelligence 24x7x365 Removes threat from entire estate without disrupting operations Helps enhance defences by offering real actionable intelligence Drives the true value out of IDS and SIM solutions An effective way to counter “Day Zero” attacks !
EnCase Incident Response
22
A professional Malicious attacker tries to penetrate your network and you have netForensics deployed.
The SIM (netForensics) & other perimeter defence products throw up hi-priority alerts
Alert passed on to EnCase Enterprise Automatic Snapshot of target machine retrieved (all
processes running in RAM of target) Your SIRT team analyse snapshot results to determine
malicious processes Process can be killed remotely and forensically wiped on
target node Malicious/Rogue process hashed and enterprise sweep
carried out to determine extent of breach. Can be remotely wiped on all “infected” nodes to clean network
Case Review IR
23
Kill Malicious Process – options
Choice of deleting the process file, or
deleting and wiping from hard drive
24
Global Market Leaders across industries rely on Guidance Software