+ All Categories
Home > Technology > Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve...

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve...

Date post: 18-Dec-2014
Category:
Upload: stevewerby
View: 179 times
Download: 2 times
Share this document with a friend
Description:
20 years ago information security was a low corporate priority that was the realm of technical geeks. Factors such as the rapidly-evolving threat environment and increased corporate impact have elevated it to a multidisciplinary risk management discipline…which sometimes has a seat at the table. This talk explores what we’re doing wrong, why it’s ineffective (or worse), and better ways of thinking and doing. You will learn to question the status quo, rethink existing paradigms, and leverage better approaches from information security and other disciplines. Think different! Act different!
83
Steve Werby DerbyCon 2014 Bad Advice, Unintended Consequences, and Broken Paradigms: Think and Act Different 1
Transcript
Page 1: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

1

Steve WerbyDerbyCon 2014

Bad Advice,Unintended Consequences,and

Broken Paradigms:

Think and

Act Different

Page 2: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Bad Advice,Unintended Consequences,and

Broken Paradigms:

Think and

Act Different

1

@stevewerby

Steve WerbyWerbyCon 2014

Page 3: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

goto fail; goto fail;

Don’t have a strategy…or a [vision|mission|target state|roadmap] Don’t understand risk Serve as an obstacle…because we don’t align with the business Don’t engage our stakeholders Scream about irrelevant vulns Want to solve everything with shiny things Yet don’t know how are shiny things work And only use a fraction of their capabilities Can’t state how effective we are But think we’re right and they’re wrong

2

Page 4: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

We’re Doing it Wrong

Insanity [noun] \in-ˈsa-nə-tē\: Doing the same thing over and over again and expecting different results

3

Page 5: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

We’re Doing it Wrong

Infosec [noun] \in-ˈsa-nə-tē\: Doing the same thing over and over again and expecting different results

4

Page 6: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Disclaimer

“I am Jack’s raging bile duct.”

5

fbbba818c9dcdcbd9c6e2430f59871e8

Page 7: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Who am I?

I am not a rock star

6

Page 8: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

What Information Security Is (Allegedly)

Information security is the practice of defending information against unauthorized access, use, disclosure, modification, or destruction

7

Page 9: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

What Information Security Is (Really)

Information security is the defense of information and IT systems in alignment with stakeholders' direction for addressing risk and opportunities

8

Page 10: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

What Information Security Is (Really)

Information security is the defense of information and IT systems in alignment with stakeholders' direction for addressing risk and opportunities

Breaking it Down• What information do we have?• What IT systems use it?• Who are stakeholders?• What are our risks?• What are our opportunities?

9

Page 11: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

We’re Doing it Wrong

0KPMG: Cyber Security: It’s Not Just About the Technology (http://www.kpmg.com/GI/en/IssuesAndInsights/ArticlesPublications/Documents/cyber-security-not-just-about-technology.pdf)

Page 12: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

How can we align with org’s objectives?

What do you think we should do?

What’s our risk for scenario I read about?

Should we address this?

How can we prevent this in the future?

How did you let this happen!?

The Stakeholder Immaturity Model

11

Page 13: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Bad Advice – Passwords

Make them complex Memorize them Change them regularly

12

Page 14: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Bad Advice – Passwords

12

Hard to guess Protect them Hard to crack the hash

Make them complex Memorize them Change them regularly

Page 15: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

12

Hard to guess Protect them Hard to crack the hash

Make them complex Memorize them Change them regularly

Compliant, but weak, reused, and similar Write them down, but poorly protected Only if forced, increment/rotate

Unintended Consequences – Passwords

Page 16: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Passwords

Make it loooooooooooooong Disallow common topologies1

Require a Unicode character Audit them

131 KoreLogic Security Blog: Pathwell Topologies (https://blog.korelogic.com/blog/2014/04/04/pathwell_topologies)

Page 17: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Passwords

Make it loooooooooooooong Disallow common topologies1

Require a Unicode character Audit them

131 KoreLogic Security Blog: Pathwell Topologies (https://blog.korelogic.com/blog/2014/04/04/pathwell_topologies)

thinkandactdifferentinfosec ullllldd passw rd⛽ If too easily guessed, force change

Page 18: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Broken Paradigm – Policy

Legalese Verbose What to [not] do

14

Comprehensible Retainable What to [not] do and why

Great for CYA, but don’t understand it, can’t retain it Don’t read it Don’t know why and think we don’t get it

Page 19: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Policy

Keep traditional policy if you want, but translate and/or create cheat sheet

15

Create a password which isn’t guessable by someone who knows you or is similar to one you currently or previously used here or anywhere else. Protect it by never sharing it with ANYONE, being wary of phishing attacks, and by memorizing it or writing it down in securely.Adversaries are good at tricking people and using their knowledge of typical approaches for constructing passwords.Don’t let them gain access to your personal accounts and info or the company information you have access to.

Page 20: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Broken Paradigm – CIA Triad

16

Page 21: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Broken Paradigm – CIA Triad

16

Page 22: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Werbian Quintet

Level 1

• Utility• Availability

Level 2

• Integrity

Level 3

• Confidentiality/Possession• Authenticity

17

Page 23: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Broken Paradigm – The Quartet of Doom

18

Passwords Firewalls

OS Patching Antivirus

Page 24: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

“I am Jack’s cold sweat.”

19

Page 25: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

If This is You, You’re Doing it Wrong!

20FUD: 005 (http://fearuncertaintydoubt.wordpress.com/2009/12/21/fud-005/)

Page 26: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

If This is You, You’re Doing it Wrong!

21User Friendly: Please Create a Password (http://ars.userfriendly.org/cartoons/?id=20070929)

Page 27: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Broken Paradigm – Vulnerability Management

Unlocked, 20-year old, empty beaten up car in middle of full parking lot

Unlocked house with $10MM in diamonds in the middle of the desert and only 1 person knows it’s there

22

Page 28: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Broken Paradigm – Vulnerability Management

Unlocked, 20-year old, empty beaten up car in middle of full parking lot

Unlocked house with $10MM in diamonds in the middle of the desert and only 1 person knows it’s there

22

Insignificant impact

Improbable threat

Context is critical

Page 29: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Risk is This…Because Algebra

R = Threat * Vulnerability * Impact R = Likelihood * Impact• Almost certainly a range of impact/likelihood scenarios• Likelihood of threat exploiting a vulnerability

resulting in impact

23

Page 30: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

“I am Jack’s wasted life.”

24

Page 31: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Risk Assessment Model and Infosec Lexicon

25

Iteration 1: Impacts and threats – impact, threat actor, likelihood Iteration 2: Exploitation likelihood – attack vectors, likelihood Iteration 3: Assessment of controls – controls, residual risk, risk appetite Iteration 4: Controls architecture – define controls, residual risk, risk appetite

Page 32: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Threat Actor / Motivation Likelihood Matrix

26

Page 33: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Ask Questions (Direction)

Are we meeting stakeholder expectations?

27

Page 34: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Ask Questions (Direction)

Are we meeting stakeholder expectations?• Who are our stakeholders?• What are their goals and concerns?• Are we helping them achieve their goals?• Are we reporting our progress?• Do they understand what we’re telling them?• What has their feedback been?

27

Page 35: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Ask Questions (Risk Scenarios)

What if someone stole the CEO’s laptop while he was using it at the park?

28

Page 36: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Ask Questions (Risk Scenarios)

What if someone stole the CEO’s laptop while he was using it at the park?• Are there preventive or detective controls in place?• Does he know who to contact?• Do you know what info and systems are accessible?• Is there an incident response plan for this scenario?• How long will the incident take to contain?

28

Page 37: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Ask Questions (Capabilities)

What percentage of critical vulnerabilities for systems in our environment are exploited in the wild before we’ve remediated them? Exploited in our environment?

29

Page 38: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Ask Questions (Capabilities)

What percentage of critical vulnerabilities for systems in our environment are exploited in the wild before we’ve remediated them? Exploited in our environment?• How does this compare to the previous quarter?• Patch frequency?• Target (and actual) turnaround between patch release and implementation?• How might we reduce this from X% to Y%?

29

Page 39: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Ask Questions (Assessment of Controls)

What if an attacker enumerated all of our AD accounts to intentionally lock them out?

30

Page 40: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Ask Questions (Assessment of Controls)

What if an attacker enumerated all of our AD accounts to intentionally lock them out?• Are there preventive or detective controls in place?• Do you know what the impact would be?• Is there an incident response plan for this scenario?• How long will the incident take to contain?• What was the objective of the control and is the objective being met?

30

Page 41: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Attack Trees

How can we better protect our CEO’s devices when he travels to China?• Assumption: Threat actor = competitor, motivation = espionage, skills = high• Goal: Acquire trade secrets

31

Page 42: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Attack Trees

How can we better protect our CEO’s devices when he travels to China?• Assumption: Threat actor = competitor, motivation = espionage, skills = high• Goal: Acquire trade secrets

31

Page 43: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – How Might We?

Install RF hardware in laptop (or modify BIOS or modify a component) Ask yourself “How might we?”

32

Page 44: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – How Might We?

Install RF hardware in laptop (or modify BIOS or modify a component) Ask yourself “How might we?”

32

How might we:• Mitigate a HW modification?• Detect a HW installation?• Mitigate the risk after CEO’s

return?

Page 45: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – How Might We?

Install RF hardware in laptop (or modify BIOS or modify a component) Ask yourself “How might we?”

32

How might we:• Mitigate a HW modification?• Detect a HW installation?• Mitigate the risk after CEO’s

return?

• Tamper-proof tape• Weigh the laptop• Destroy laptop or sanitize and sell

Page 46: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – How Might We?

Steal in-use laptop Ask yourself “How might we?”

33

Page 47: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – How Might We?

Steal in-use laptop Ask yourself “How might we?”

33

How might we:• Prevent it or mitigate it?

Page 48: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – How Might We?

Steal in-use laptop Ask yourself “How might we?”

33

How might we:• Prevent it or mitigate it? • Not use it in public

• Stay-alive code• Proximity device to trigger logout

Page 49: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

“I am Jack’s epiphany.”

34

Page 50: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Assume Failure

Before a project, initiative, or major change, assume it will fail• Do individually, more than one individual, discuss

35

Page 51: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Metrics

36

Average # of days to patch a vulnerability

# of people who opened phishing security awareness communication

% of web apps with VAs performed last year

Page 52: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Metrics

36

% of vulns patched after threshold & median days > threshold

% of users exhibiting undesired phishing response by awareness status

% of web apps with VAs having repeat OWASP Top 10 findings

Average # of days to patch a vulnerability

# of people who opened phishing security awareness communication

% of web apps with VAs performed last year

Page 53: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Metrics

36

% of vulns patched after threshold & median days > threshold

% of users exhibiting undesired phishing response by awareness status

% of web apps with VAs having repeat OWASP Top 10 findings

Describe outcomes, capabilities, or progress towards target state Answer questions or allow you to formulate new questions Are meaningful and actionable

Average # of days to patch a vulnerability

# of people who opened phishing security awareness communication

% of web apps with VAs performed last year

Page 54: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Understand Stakeholders

37

Identify stakeholders Define roles Understand goals/needs

Page 55: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Understand Stakeholders

37

You, CFO, CIO, Audit, Law, Owner, User Identify stakeholders Define roles Understand goals/needs

Page 56: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Understand Stakeholders

37

You, CFO, CIO, Audit, Law, Owner, User RACI model CFO – fiscal responsibility, ROI

CIO – deliver value, cut costsAudit – assurance of controlsUser – effectiveness, efficiency

Identify stakeholders Define roles Understand goals/needs

Page 57: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Communicate with Stakeholders

38

Establish channels Speak their language Educate them Concise, defensible Choices

Page 58: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Communicate with Stakeholders

38

Establish channels Speak their language Educate them Concise, defensible Choices

Formal group, leverage group, survey ! [0-day|worm|insecure] Lexicon, role, bidirectional collaboration Strategy, roadmap, progress, risk environ Menu, considerations, likely outcomes

Page 59: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Get What You Want

39

Make it benefit them

Page 60: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Get What You Want

39

Make it benefit them Longer password by giving up expiration

Page 61: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Gorge on Data

40

You’ll find:• Baselines• Patterns• Correlations

• New questions to ask

Page 62: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Gorge on Data

40

You’ll find:• Baselines• Patterns• Correlations

• New questions to ask

• ECM documents accessed daily by user• 19% of users’ passwords are ULLLLLLNS• 317% more likely to forget password if changed

entering weekend, holiday, or vacation• What are USB flash drives being used for?

Page 63: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Broken Paradigm – The Quartet of Doom

41

Passwords Firewalls

OS Patching Antivirus

Page 64: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Broken Paradigm – The Quartet of Doom

42

Passwords Firewalls

OS Patching Antivirus

Preventunauthorized access

Reduceexploitation

Barricadevulnerable systems

Detectmalicious code

Page 65: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

The Quartet of Potential Hope and Lower Discontent

43

Passwords Firewalls

OS Patching Antivirus

Preventunauthorized access

Reduceexploitation

Barricadevulnerable systems

Detectmalicious code

OTPs Anomaly Detection

Malware SandboxingMitigate Java

Page 66: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Broken Paradigm – The Quartet of Doom

44

Control Success Confidence

RiskMitigation

UserFriction

ImplementBurden

Govern/AdminBurden

OrgFriction

Cost

Passwords 2* 3 3 - 1 3 1

OTPs 4 4 2 3 4 4 4

Firewalls 1 2 5 - 1 1 1Anomaly Detection 2 4 3 5 1 4 2

OS Patching 3 1 3 - 3 3 2Mitigate Java 5 5 5 2 5 5 1

Antivirus 2 1 3 - 2 4 2Malware Sandbox 3 3 5 2 4 5 3

* 1 is the least desirable, 5 is the most desirable

Page 67: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Yes, You Can Tame Java

45

Deployment Rule Sets (then you can actually patch too!) Block User Agent for Java at proxy Microsoft EMET

Page 68: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Yes, You Can Tame Java

45

Deployment Rule Sets (then you can actually patch too!)• Install multiple versions of Java per device• Limit which applets and applications end user can execute• Limit which version of Java is associated with each

Page 69: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Yes, You Can Tame Java

45

Deployment Rule Sets (then you can actually patch too!)• Install multiple versions of Java per device• Limit which applets and applications end user can execute• Limit which version of Java is associated with each

Block User Agent for Java at proxy• Query proxy logs for visited hosts that used Java user agent• Aggregate by host, sort by frequency, analyze• Generate exclusions• Attacker can not modify the user agent before exploit attempt• Prevents web-based attacks against all operating systems

Page 70: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Yes, You Can Tame Java

45

Deployment Rule Sets (then you can actually patch too!)• Install multiple versions of Java per device• Limit which applets and applications end user can execute• Limit which version of Java is associated with each

Block User Agent for Java at proxy• Query proxy logs for visited hosts that used Java user agent• Aggregate by host, sort by frequency, analyze• Generate exclusions• Attacker can not modify the user agent before exploit attempt• Prevents web-based attacks against all operating systems

Microsoft EMET

Page 71: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Yes, You Can Tame Java

46

Option RiskMitigation

ImplementBurden

Govern/AdminBurden

UserFriction

Deployment Rule Sets H M L L

Patch Acceleration M M M MBlock Java at Proxy H L L LEMET to Protect Java H L L L

Implementation order• Block Java at proxy• EMET to project Java• Deployment Rule Sets• Patch acceleration

Page 72: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Start *Somewhere*

47

Where?• Easiest? Highest value? With person who raises hand?• May not be your call• Could be based on surprise opportunity

Be prepared• Incident in your environment• Incident elsewhere• Inquiry from stakeholder

Crawl, walk, run – gain experience and learn lessons

Page 73: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Start *Somewhere* (Local Admin PW)

48

Scenario: Single enterprise-wide weak Local Admin password (LA PW) which hasn’t been changed in years and was poorly controlled

Document risk, share options with stakeholders Change it to an acceptable password && implement governance Create unique LA PW for segments of population Create unique LA PW for each device based on root + device attribute Create unique random LA PW for each device via PW escrow tool Eliminate use of the LA PW

Page 74: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Go Against the Grain

49

Get a Mac campaigns from 2006 to 2009 Higher the penetration of a technology or tool, the more likely it will be

targeted• If you use tools with high penetration

- How quickly can your use of it be discovered?- Do you have compensating controls?- How quickly can you remediate vulnerabilities?

Consider technologies, tools, and configurations that reduce exploitation likelihood

Page 75: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Step Out of the Echo Chamber

50

Infosec is a field compromised of numerous disciplines Social engineering => psychology, marketing, data analytics Infosec• Risk mgmt• Strategy• Negotiation

• Statistics• Probability• Data analytics• Psychology• Marketing• Education

• Law• Privacy• Fraud prevention• Finance

• Human factors engr• Operations research• Military science• Safety

Page 76: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Equal Treatment Not Required

51

Some people are riskier• Based on system/data access• Role/visibility• Security hygiene• Disgruntled/disciplined/separating• Internet presence

Page 77: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Think && Act Different – Equal Treatment Not Required

51

Some people are riskier• Based on system/data access• Role/visibility• Security hygiene• Disgruntled/disciplined/separating• Internet presence

It’s OK to treat them differently• Different training• Different detective and preventive controls• If a systems’ users are higher risk, so is the system (inherited risk)

Page 78: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

If This is You, You’re Doing it Wrong!

52Dilbert: Mordac, the Preventer of Information Services (http://dilbert.com/strips/comic/2007-11-16/)

Page 79: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

The Challenge

53

Think and act different.

Page 80: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

The Challenge

53

Think and act different.Share your experiences.

Page 81: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

The Challenge

53

Think and act different.Share your experiences.Do infosec better.

Page 82: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

The Challenge

53

Think and act different.Share your experiences.Do infosec better.Get better infosec outcomes.

Page 83: Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Different, Presented by Steve Werby at DerbyCon 4 in 2014

Bad Advice,Unintended Consequences,and

Broken Paradigms:

Think and

Act Different

54

@stevewerby

Steve WerbyWerbyCon 2014Questions? Ideas? Thoughts?


Recommended