+ All Categories
Home > Documents > FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21...

FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21...

Date post: 09-Jun-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
26
FTL CIO Council October 18, 2017 Meeting Anthony Puca Cloud Infrastructure Architect |Federal Government
Transcript
Page 1: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

FTLCIOCouncilOctober18,2017MeetingAnthonyPucaCloudInfrastructureArchitect |FederalGovernment

Page 2: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

http://www.amazon.com/System-Center-Configuration-Manager-Unleashed/dp/0672330237

http://www.amazon.com/Microsoft-Office-365-Administration-Inside/dp/0735678235

(http://www.amazon.com/Microsoft-Azure-Planning-Deploying-Managing/dp/1484210441)

Page 3: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •
Page 4: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

4

Momentum

750million

194billion

188billion

340billion

>90%ofFortune500useMicrosoftCloud

Page 5: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

5

CloudbusinessvaluemadeeasyOnPremises

Toppings

TomatoSauce

Assembly

Peel/Cutter

Oven

PizzaDough

Beverages

Dining Table

Electric/Gas

Youmanage

Infrastructure(asaService)

Toppings

TomatoSauce

Assembly

Peel/Cutter

Oven

PizzaDough

Beverages

Dining Table

Electric/Gas

ManagedbyVendor

Youmanage

Take&BakeMadeatHome

Platform(asaService)

ManagedbyVendor

Youmanage

Toppings

TomatoSauce

Assembly

Peel/Cutter

Oven

PizzaDough

Dining Table

Electric/Gas

Beverages

PizzaDelivered

ManagedbyVendor

Software(asaService)

Toppings

TomatoSauce

Assembly

Peel/Cutter

Oven

PizzaDough

Dining Table

Electric/Gas

Beverages

DineOut

YouManage

VendorManages

Page 6: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

6

AzurebusinessvalueOnPremises

Storage

Servers

Networking

O/S

Middleware

Virtualization

Data

Applications

Runtime

Youmanage

Infrastructure(asaService)

Storage

Servers

Networking

O/S

Middleware

Virtualization

Data

Applications

Runtime

ManagedbyM

icrosoft

Youmanage

Windows AzureVirtualMachinesWindows ServerHyper-VWindows Server

Platform(asaService)

ManagedbyM

icrosoft

Youmanage

Storage

Servers

Networking

O/S

Middleware

Virtualization

Applications

Runtime

Data

Windows AzureCloudServices

ManagedbyM

icrosoft

Software(asaService)

Storage

Servers

Networking

O/S

Middleware

Virtualization

Applications

Runtime

Data

Office365DynamicsCRM

YouManage

MicrosoftManages

Page 7: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

7

RegulatoryCompliance

Page 8: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

8

TrustCenter- https://www.microsoft.com/en-us/TrustCenter/default.aspx

Page 9: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

Azurecovers54complianceregimesAzurehasthedeepest andmostcomprehensive compliancecoverageinthe industry

USGov

HIPAA/HITECHAct

ModerateJABP-ATO FIPS140-2

FERPA

DoDDISASRGLevel2 ITAR CJIS

GxP21CFRPart 11

IRS1075Section508VPAT

Global

ISO27001SOC1Type2ISO27018

CSASTARSelf-Assessment

Regional

SingaporeMTCS

UKG-Cloud

AustraliaIRAP/CCSL

FISCJapan

ChinaDJCP

NewZealandGCIO

ChinaGB18030

EUModelClauses

ENISAIAF

ArgentinaPDPA

JapanCSMarkGold

SP800-53&171

ChinaTRUCS

SpainENS

Industry

PCIDSSLevel1 CDSA

SharedAssessmentsMPAA

JapanMyNumber Act

FACTUK

HighJABP-ATO

GLBA

DoDDISASRGLevel4

MARS-E FFIEC

ISO27017SOC2Type2 SOC3

IndiaMeitY

CanadaPrivacyLaws

PrivacyShield

ISO22301

GermanyITGrundschutzworkbook

SpainDPA

CSASTARCertification

CSASTARAttestation

HITRUST IGToolkitUK

DoDDISASRGLevel5

ISO9001

Trust

Page 10: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

ISO27001

Page 11: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •
Page 12: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •
Page 13: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

FERPA

Page 14: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

HIPAA/BAA

Page 15: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

15

DetectRespond

Recover Protect

DigitalTransformation

Identify

Page 16: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

16

Protect Detect Respond Recover

AzureADIdentity Protection

Advanced ThreatAnalytics/Identity ManagerOffice365ATP

Windows DefenderATP/DefenderAV

MicrosoftCloudApp Security

AzureSecurity CenterAzureWebApp Firewall/SQLThreatDetection

AzureMarketplacePartnerCapability

AttackTimelineGeneration

Isolatemachinefromnetwork

RemoveMalware

Block&CleanEmail

Self-ServicePasswordReset

ObserveAdversaryOperation

RefineDetectionsandPreventions

EventCorrelation&DynamicQueries

AttackImpactanalysisUser&Entity

BehaviorAnalytics

FileBehaviorAnalysis(Sandbox Detonation orRealtimeMonitoring)

MaliciousURLsandIPaddresses

OWASPTopRisks(SQLInjection, XSS,etc.)

Anti-malware

Quarantine sharedSensitive Data

OnDemandDetonation

MachineLearningBlockingRisky Events Anomaly Detection

Page 17: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

17

TrendsinCloudSecurity

Page 18: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

18

Coresecurityquestions

Thereisonepersonineveryorganizationwhowillclickonanything

Page 19: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

1. Weknowthatadministratorshavethekeystothekingdom;wegavethemthosekeysdecadesago

2. Butthoseadministratorsprivilegesarebeingcompromisedthroughsocialengineering,bribery,coercion,privateinitiatives

Stolenadmincredentials

Insiderattacks

Phishingattacks

Page 20: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

20

FirstWorkstationCompromised

24-48Hours

DomainAdminCompromised

AttackDiscovered

DataExfiltration(AttackerUndetected)11-14months

Research&Preparation

Theanatomyofatypicalbreach

Page 21: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

21

PLAN ENTER TRAVERSE EXECUTE MISSION

4 Threat Actorsexfiltrate PIIandothersensitivebusiness dataThreatActortargetsemployee(s)

viaphishingcampaign1

Workstationcompromised,threatactorgatherscredentials2a

Threat Actorsuse stolencredentialstomovelaterally3a

EmployeeBopensinfectedemail(MobileorPC).Attackerdisablesantivirus

2b Compromisedcredentials/deviceusedtoaccesscloudservice /enterpriseenvironment

3bc

Credentialsharvestedwhenemployeelogsintofakewebsite

2c

A.EnterandNavigate

Anyemployeeopensattackemailà Accesstomost/allcorporate data

B.DeviceCompromiseTargetedemployeeopensattackemailà Accesstosamedataasemployee

C. RemoteCredentialHarvesting

Targetedemployee(s)entercredentialsinwebsiteà Accesstosamedataasemployee(s)

CommonAttacks

Any

Page 22: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

ProblemAbreachwill(alreadydid?) happenLackingthesecurity-analysismanpowerCan’tdetermine theimpactofthebreachUnabletoadequately respond tothebreach

Newapproach(inadditionto‘prevention’)Limitorblock thebreachfromspreadingDetectthebreachRespond tothebreach

Page 23: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

Network OperatingSystem Identity Application

Information Communications Management Physical

Page 24: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

24

InternetofThingsUnmanaged&Mobile Clients

SensitiveWorkloads

CybersecurityReferenceArchitecture

ExtranetAzureKeyVault

Microsoft Azure

OnPremisesDatacenter(s)

NGFW

Nearlyall customerbreachesthatMicrosoft’sIncidentResponseteaminvestigatesinvolvecredentialtheft63%ofconfirmeddatabreachesinvolveweak,default,orstolenpasswords(Verizon2016DBR)

Colocation

$

MacOS

Multi-FactorAuthentication

MIMPAM

Network Security Groups

AzureADPIM

WindowsInfoProtection

Enterprise Servers

VPN

VPN

VMs VMs

CertificationAuthority(PKI)

Security Operations Center (SOC)

WEF

SIEMIntegration

IoT

Identity & Access

Windows10Managed Clients

SoftwareasaService

ATA

AzureInformation

Protection(AIP)• Classify• Label• Protect• Report

EndpointDLP

ClassificationLabe

ls

Office 365

Information Protection

LegacyWindows

HoldYourOwnKey(HYOK)

80%+ofemployeesadmitusingnon-approvedSaaS appsforwork (Stratecast, December2013)

IPS

EdgeDLP

SSLProxy

AzureADIdentity Protection

SecurityAppliances

Lastupdated July2017– latestathttp://aka.ms/MCRA

EPP-WindowsDefenderAV

EDR- WindowsATP

AzureSQLThreatDetection

Windows Server2016SecurityShieldedVMs,DeviceGuard,CredentialGuard,JustEnoughAdmin,Hyper-VContainers,Nanoserver, DefenderAV,DefenderATP(Roadmap),andmore…

AzureAppGateway

AzureAntimalware

SQLEncryption &DataMasking

SQLFirewall

Disk&StorageEncryption

ConditionalAccess

Office 365ATP• EmailGateway• Anti-malware • Threat Protection

• Threat Detection

AzureSecurityCenter (ASC)

Analytics/UEBA

MSSPWindowsSecurityCenter

AzureSecurityCenter

VulnerabilityManagement

SIEM

Office365• Security&Compliance• Threat Intelligence

HelloforBusiness

Windows 10Security• SecureBoot• DeviceGuard• Exploit Guard• Application Guard• Credential Guard

• Windows Hello• RemoteCredential Guard

• DeviceHealthAttestation

Security Development Lifecycle (SDL)CybersecurityOperationsService(COS) IncidentResponseand

RecoveryServices

Office 365DLP

CloudAppSecurity

LockboxASM

IntuneMDM/MAM

DDoSattackmitigation

Backup&SiteRecoverySystemCenterConfigurationManager+Intune

PrivilegedAccessWorkstations(PAWs)

Shielded VMs

ESAEAdminForest

DomainControllers

Page 25: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

25

TrendsinGlobalCybersecurity

1. Severityofvulnerabilities2. Vulnerabilitycomplexity3. Newapplicationvulnerabilities4. Platform-agnosticvulnerabilities5. DecliningJavaexploits6. Extentofexploitkits7. Mostcommonlydetectedobjects–Flash/Silverlight(akaActiveX)8. Globalsecurityconcerns9. IncreasedTrojanlevels10. Continuedcomplexityofthreats

Findoutaboutthelatestthreatstoendpointsandthecloudhttps://www.microsoft.com/en-us/security/intelligence-report

Page 26: FTL CIO Council October 18, 2017 Meeting · 18/10/2017  · The anatomy of a typical breach. 21 PLAN ENTER TRAVERSE EXECUTE MISSION ... • Exploit Guard • Application Guard •

� Exploreadditionalresources:– TrustworthyComputingCloudServices:

www.microsoft.com/trustedcloud

– MicrosoftTrustCenterforMicrosoftAzure:http://www.windowsazure.com/en-us/support/trust-center


Recommended