+ All Categories
Home > Internet > NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

Date post: 16-Apr-2017
Category:
Upload: north-texas-chapter-of-the-issa
View: 412 times
Download: 2 times
Share this document with a friend
26
Identity as a Threat Plane Leveraging UEBA and IdA Mark Mandrino Director UEBA
Transcript
Page 1: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

IdentityasaThreatPlaneLeveragingUEBAandIdA

MarkMandrinoDirectorUEBA

Page 2: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

Thecompromiseandmisuseofidentity isoftenatthecoreofmodernthreats

Copyright©2016Gurucul.Allrightsreserved. Slide2

Page 3: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

IdentityisaThreatSurface

InsiderThreats

AccountHijacking

DataExfiltration

CyberFraud

AccessAbuse

Copyright©2016Gurucul.Allrightsreserved. Slide3

Page 4: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

IdentityisaPerimeter

ExcessAccess

AccessOutliers

AccountVolume

OrphanAccounts

Rule-basedRoles

PrivilegeAccess

Copyright©2016Gurucul.Allrightsreserved. Slide4

Page 5: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

Objectives

PredictRisk

ThroughIdentity(UEBA)

ReduceAttackSurfaceArea(IdA)

IDENTITY

Copyright©2016Gurucul.Allrightsreserved. Slide5

Page 6: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

User

AccountsEntitlements

Copyright©2016Gurucul.Allrightsreserved. Slide6

IDENTITYProfile

10,000Identitiesx 10AccountsEachx 10EntitlementsEach1,000,000Entitlements

Page 7: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

Copyright©2016Gurucul.Allrightsreserved. Slide7

PopularUseCase:PrivilegeAccessAbuse

UEBADetectPrivilegeAccessAbuse

NeedPrivilegeAccounts…

Morethan50%ofPrivilegeAccessisUnknown

PrivilegeAccountList/Report

DirectoryIAM/PAMDiscovery?

IdADetectPrivilegeEntitlements

EntitlementsDefinePrivilege

MachineLearningEnhancesIAM&PAM

Page 8: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

NewApproachRequired

Copyright©2016Gurucul.Allrightsreserved. Slide8

Page 9: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

BigDataMachineLearning

Usershaveatrailofdigitalexhaustascontextformachinelearning

User/EntityBehaviorAnalytics(UEBA)

IdentityAnalytics(IdA)

CloudSecurityAnalytics

Identity

Accounts

Access

Activity

Risk

Copyright©2016Gurucul.Allrightsreserved. Slide9

Page 10: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

DataSources=Context

IdentityAccessManagement

PrivilegeAcct.Management

Directories

SIEM/LEMs

FW/VPN/SWGs

CloudApps

NetworkFlows

Databases

Authentication

File/Storage

ThreatIntelVulnerabilities

Copyright©2016Gurucul.Allrightsreserved. Slide10

Page 11: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

User&EntityBehaviorAnalytics

DetectingtheUnknownUnknowns

Copyright©2016Gurucul.Allrightsreserved. Slide11

Page 12: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

Machinelearningbuildsbaselines(250+Attributes)LearnnormaltodetectabnormaluserbehaviorsLeveragepeergroupsforclusteringtodetectoutliersDynamicPeerGroupsprovidemoreaccuracy

Copyright©2016Gurucul.Allrightsreserved. Slide12

Step

1:B

ehavioral

Machine

Learning

Page 13: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

Machinelearningfocusesonanomalies&riskscoringLeveragesbehaviorpatternsandthreatlibrariesLearnstime-basednorms(acceptedworkflows,operationalchanges)180+MLModels

Copyright©2016Gurucul.Allrightsreserved. Slide13

Step

2:Predictive

Machine

Learning

Page 14: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

• Largemanufacturingcompany• ConcernedaboutIPdatatheft• Knownbaddefenses(SIEM,NGFW,etc.)• FocusedonidentitywithUEBAdatascience

CASESTUDYMonitorUse

SeconddayusingUBAdetectedtwohijackedresearchaccounts

Page 15: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

• Largeinsurancecompany• Collaborationwithusersviaselfaudit• UsershavemorecontextthanSOCteams• StartedweeklyreportstoHPAaccounts

CASESTUDYSelfAudit

EnduserPTOonWednesday,reportonFridayshowsaccountactivity,compromised3.5years

Page 16: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

UEBA:UseCasesAccountCompromise/HijackingAccountSharing/AbusePrivilegeAccessAbuseDataExfiltration/ProtectionIntellectualPropertyProtectionInsiderThreatDetection&DeterrenceSelfAudit&IDTheftDetectionCyberFraudTrustedHost/EntityCompromiseStep-upAuthenticationAnomalousBehaviorWatchListsSIEMRiskIntelligenceDLPRiskIntelligenceHybridBehaviorAnalytics

Bi-directionalAPIIntegration

UI

Closed-Loop

Page 17: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

IdentityAnalytics(IdA)

Copyright©2016Gurucul.Allrightsreserved. Slide17

Administration Activity

IdentityAnalytics

Contextual,dynamic,risk-basedapproachforidentityaccessmanagement

Whohasaccesstowhat?

Whataretheydoingwithit?

Page 18: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

IdABe

nefits

• Avoidtherubberstamp• Risk-basedcertifications• Increaserevocationrates

AccessCertifications

• Avoidusercloning• Risk-basedrequests• Risk-basedapprovals

AccessRequests&Approvals

• Rolereconciliation• Intelligentroles• SoD monitoring

AccessPolicies&Roles

• Orphan&dormantaccounts• Unusedrolesandgroups• Excessaccess&accessoutliers

AccountClean-up

• Privilegeaccess,sharedaccounts,andmisuse• Activitymonitoringforbehavioranomalies• Real-timealerting/response

MonitorUsers

Copyright©2016Gurucul.Allrightsreserved. Slide18

Page 19: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

BigDataAnalyticsFunnel

BigData/DataLake

SecurityAnalytics(SIEM,DLP,NBA,EDR,CASB)

BehaviorAnalytics(UEBA)

IdentityAnalytics(IdA)

PrivilegeAccessAnalytics(PAA)

On-Premise Cloud

Copyright©2016Gurucul.Allrightsreserved. Slide19

Page 20: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

IdentityAccessIntelligence

ReduceExcessAccessRisksDetectAccessOutliersDefineIntelligentRolesRisk-basedProvisioningEnableAdaptiveAccess

RadicallyReduceIdentityThreatPlaneExposure

Copyright©2016Gurucul.Allrightsreserved. Slide20

Page 21: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

• LargeFinancialInvestmentCompany• RecognizedIdentityasaThreatPlane• Focusedon‘managingaccess’withIdA• IdA basedonbehavioranalyticsdatascience

CASESTUDYManageAccess

83%ReductioninAccountsandEntitlements,definedIntelligentRolesfor11businessunits

Page 22: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

IdA:UseCasesExcessAccess&AccessOutliersOutlierAccessClean-up(OIM)PrivilegeAccessAnalyticsRisk-basedCertificationsRisk-basedAccessRequestsDynamicAccessProvisioningRole-AccessReconciliationRoleMining&IntelligentRolesAccessGovernance&SoD MonitoringDormant&OrphanAccountMgmt

Bi-directionalAPIIntegration

UI

Closed-Loop

Page 23: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

CloudAnalyticsPlatform

Page 24: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

NewToolsTransition

SIEM/LEM

Rules- QueriesStatistics- Correlations

ThreatHunting

BigDataWarehouse

MachineLearningAlgorithmsUser/EntityBehaviorAnalyticsIdentity&PrivilegeAnalyticsCloudSecurityAnalyticsPredictiveRiskScoring

Machinelearningcansurpasswhathumansandsoftwareengineeringcandetect

UNKNOWNKNOWN

Copyright©2016Gurucul.Allrightsreserved. Slide24

Page 25: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

NewApproachRequired

Copyright©2016Gurucul.Allrightsreserved. Slide25

UEBA&IdA areforcemultiplierstransformingSIEM,IAM/PAMandDLP

Page 26: NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA

GetitRightCopyright©2016Gurucul.Allrightsreserved. Slide26


Recommended