+ All Categories
Home > Documents > Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA...

Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA...

Date post: 01-Apr-2015
Category:
Upload: ibrahim-lion
View: 214 times
Download: 1 times
Share this document with a friend
Popular Tags:
15
ENTERPRISE INFORMATION SECURITY ... A DIFFERENT VIEW Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011
Transcript
Page 1: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

ENTERPRISE INFORMATION SECURITY

... A DIFFERENT VIEW

Deepak Rout

Nullcon (Dwitiya)Goa26 Feb 2011

Page 2: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

Agenda

• Data Leakage Prevention …a new paradigm

• IBA instead of RBA …turning ‘The Standard’ around

• What’s in store for us!

• Q & A

Page 3: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

Shortcomings of a Readymade DLP Solution

Very high false positives Long gestation period Data Leakage due to the DLP solution Several data leakage avenues left out

Mass storage devices Unmonitored Internet access Uncontrolled Exception Management Too many Admins/Super-Users

Differing Legal/Regulatory provisions - Globally

Result: Unintentional data loss gets detected, while planned Data Theft or Corporate Espionage agent remains a step ahead of DLP policies.

Page 4: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

Data Leakage Preventions - Essentials

• Business/Management Concerns on Security of Data • Statutory and Regulatory Imperatives• Contracts and Agreements • Data Protection - a Security Manager’s KPI• Avoiding the Silver Bullet Syndrome• Holistic & Proactive Data Protection Framework

Page 5: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

Holistic Approach to Reduce Data Leakage

Closing data leak channels not required for business Proactively monitoring channels required to be opened for business  Focus on known/suspected leak channels Adhering to ‘need to know’ Controlling leakage by authorized users (e.g. End point solution) Controlling leakage to unauthorized users (e.g. Rights management) Using technology as well as process controls Phased deployment approach Strong management intent and business involvement Educating users on DLP program and consequences of violation Effective Consequence Management and exemplary treatment Doing PDCA, if a DLP solution is deployed Knowing limitations of DLP controls/tools, brief management to accept risk Accepting that even after all controls, data leak incidents may happen:

○ Capability to audit user actions ○ Tools to investigate data leak incidents

Page 6: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

Suggested Data Leakage Prevention Framework

Page 7: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

DLP - Do Not & DoDo Not As a remedial measure in the aftermath of a particularly nasty incident Business doing well &security gets to push through security investment Getting entangled with a silver bullet DLP solution Pure selling by DLP solution providers As a mail filtering mechanism

Do Deploy a comprehensive set of DLP technologies and processes as a risk mitigation measure

which emerges from a systematic Risk Assessment based on business and security objectives

Data Loss Channels

Internet

Mass Storage Devices (USBs, SD Cards)Employee Laptops

Vendor Laptops

Hand-held Devices

E-Mail & MS Office CommunicatorHard Copy Prints

Sensitive areas like Board Room

Internal Portals

Recommended SolutionsDetect unauthorized admin access on Mail infrastructureData Loss detection capability for Email trafficLogging of Office CommunicatorData Loss detection capability for Internet trafficPrevent attachment download to handheld devicesConsolidate Internet access and put upload restrictionsRights Management SolutionDisable Mass Storage (USB, SD Cards etc) and unnecessary services (file & print sharing, Bluetooth, FTP etc) Secure end user systems and revoke administrative rightsEncrypt LaptopsSecure Printing

Page 8: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

Agenda

• Data Leakage Prevention …a new paradigm

• IBA instead of RBA …turning ‘The Standard’ around

• What’s in store for us!

• Q & A

Page 9: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

IBA instead of RBA for EIS

• 'Risk Based Approach' (RBA) - PDCA approach of identifying & mitigating

risks

• 'Incident based approach' (IBA) is an alternate to RBA - PDCA cycle based

on incident prevention

• On occurrence follow steps - Triage, Investigate, CAPA, RCA, Implement

• Digital Forensics play a anchoring role in all stages:

Triage - Preserve incident parameters

Investigation, CAPA & RCA - Diagnostics & Analysis

Prevention - Designing Enterprise Controls

Page 10: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.
Page 11: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

Typical Chronology of Digital Investigation....1

1. Prepare a clean destination hard drive:- Difficult to distinguish between old data and new- Suspect can claim that incriminating evidence was planted- Specialised tools to wipe off past data (e.g. DriveWiper Voom)- Also generates reports to demonstrate that hard disk is clean

2. Digitally image data from suspect system to target drive:- Bit-by-bit clone of original hard drive using specialized tools- Includes all files (OS, deleted, encrypted, password protected & hidden)- Data hidden surreptitiously within other files is also retrieved- OS independent tools, do not require a dedicated drive- Rapid imaging - Original hard drive is then sealed

AC

QU

IRE

Page 12: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

Typical Chronology of a Digital Investigation....2

3. Fingerprint:- To ensure that data copied from source drive to cloned drive is the same- Unique fingerprint created for each hard drive (hashing)- Suspect hard drive is seized along with hash value, known to suspect- Same hash value demonstrated on seized drive

4. Write-protect data:- Using write-protect bridges- Then onwards, the drive can only be read but not written to- Guarantees purity of evidence

5. Analyse/Investigate: - Specialised tools to scan hard drive and classify files as per category (encrypted files,

password protected files, misnamed files, image files, compressed files etc). - Password-cracking tools are used on password-protected files - Steganography (camouflaging files within another file) can be countered with tools

conforming to judicial and evidential requirements (analysed for hidden messages)

AU

TH

EN

TIC

AT

EA

NA

LYS

E

Page 13: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

Enterprise Capability Model for Digital Forensics

• Highly developed internal capability not desirable

• Minimum & potent internal capability (imaging, packet capture, logging etc)

• Advanced capabilities on-demand (image analysis, link analysis, heuristics

etc):

As appropriate for specific industry

Pre-configured per management/regulatory requirement

Pre-negotiated & with SLA

• RoI & industry considerations for configuring model

• Optimum model - limited internal & bulk outsourced capability

• After Forensics, What???

Page 14: Deepak Rout Nullcon (Dwitiya) Goa 26 Feb 2011. Agenda Data Leakage Prevention …a new paradigm IBA instead of RBA …turning ‘The Standard’ around What’s.

A View of the Future!!!• New criminal business models & malware

sophistication: Criminal organizations worldwide are increasingly migrating business models online. Complexity of threats will increase & digital crimes will be more.

• The problem will not disappear: Criminals online activities will continue to be hosted in distributed servers worldwide.

• New targets: Newer attack methodologies including targeting of SCADA systems that control key infrastructure and economy sectors (petrol, gas, electricity, water, nuclear etc).

• Economic impact. World economy’s relationship with online services is so strong that any failure could lead to complete chaos. Criminals know this and will take full advantage of it.

• Ubiquitous Malware. Citizens will continue to depend on technology and ubiquitous online services (mobiles, PDA, laptops, 3G etc). We will see more attacks targeting these technologies.

It’s a very profitable business; returns exceed stock markets (3 digit growth)…

Security will be in Business!


Recommended