+ All Categories
Home > Software > Reduce your attack surface by getting back to basics

Reduce your attack surface by getting back to basics

Date post: 13-Apr-2017
Category:
Upload: algosec
View: 499 times
Download: 0 times
Share this document with a friend
45
Do you really need more shiny security toys? Reduce your attack surface by getting back to basics Avishai Wool CTO
Transcript
Page 1: Reduce your attack surface by getting back to basics

Do you really need more shiny security toys? Reduce your attack surface by getting back to basics

Avishai WoolCTO

Page 2: Reduce your attack surface by getting back to basics

AGENDA

1. Structure of an APT attack

2. Back to Basics: Reducing the Attack Surface

3. Network Segmentation and Security Zones

4. Managing Zoned Networks with AlgoSec

2 | Confidential

Page 3: Reduce your attack surface by getting back to basics

3 | Confidential

1. STRUCTURE OF AN APT ATTACK

Page 4: Reduce your attack surface by getting back to basics

4 | Confidential

Page 5: Reduce your attack surface by getting back to basics

5 | Confidential

HOW?

1. Repeat until desired data reached:

• Recon • Deliver exploits • Explore the network• Be persistent

2. Exfiltrate data

“Advanced Persistent Threat”, Wikipedia

Page 6: Reduce your attack surface by getting back to basics

INFORMATION GATHERING

1. OSINT (Open Source Intelligence)• Port scans, vulnerability scanning externally open services

2. On-site gathering

3. HUMINT (Key employees, social engineering)

4. Foot-printing • Banner grabbing, SNMP Sweeps, DNS zone transfers, etc

6 | Confidential

http://www.pentest-standard.org/index.php/Intelligence_Gathering

Page 7: Reduce your attack surface by getting back to basics

INFORMATION GATHERING: REQUIRES NETWORK TRAFFIC

1. OSINT (Open Source Intelligence)• Port scans, vulnerability scanning externally open services

2. On-site gathering

3. HUMINT (Key employees, social engineering)

4. Foot-printing • Banner grabbing, SNMP Sweeps, DNS zone transfers, etc.

7 | Confidential

Page 8: Reduce your attack surface by getting back to basics

ATTACK TECHNIQUES (PARTIAL LIST)

• Email attachment• Send a malicious email attachment

• Browser Drive-By-Download• Host the malicious content on a website

• “Water-hole” technique• Compromise a website the victim likely to visit

• Social Engineering• Fool someone to do it for you

• Mobile malware• Spread a malicious mobile application

8 | Confidential

Page 9: Reduce your attack surface by getting back to basics

EXPLORE THE COMPROMISED NETWORK

• Move Laterally• Find more devices

• Gain more access

• Find interesting data

Lateral movement relies on (unusual) network traffic

9 | Confidential

Page 10: Reduce your attack surface by getting back to basics

ATTACK PERSISTENCY

• Attacker needs to stay for the long term

• Users tend to: • Reboot, patch their systems, update signature detection

• Solution: Deploy software on victim’s machine

• Remote Administrator Tools (RAT) are the most popular• Poison Ivy , Dark Comet, Net Wire, ….

Attack persistency relies on (unusual) network traffic

10 | Confidential

Page 11: Reduce your attack surface by getting back to basics

EXFILTRATION

• Attacker needs to exfiltrate data from the network• Encrypted over SSL

• Blend in normal traffic over HTTP

• Picture, Social media posts, pastebin, HTML tags

• VoIP

• Unusual (outbound) traffic

11 | Confidential

Page 12: Reduce your attack surface by getting back to basics

STEPPING STONES

12 | Confidential

1

2

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

InternetStep 0

Page 13: Reduce your attack surface by getting back to basics

STEPPING STONES

13 | Confidential

1

3

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

InternetStep 0

Step 1

Page 14: Reduce your attack surface by getting back to basics

STEPPING STONES

14 | Confidential

1

4

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

InternetStep 0

Step 1 Step 2 Step 3

Page 15: Reduce your attack surface by getting back to basics

STEPPING STONES

15 | Confidential

1

5

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

InternetStep 0

Step 1 Step 2 Step 3

Step 4 – exfiltrationGame Over

Page 16: Reduce your attack surface by getting back to basics

16 | Confidential

2. BACK TO BASICS: REDUCING THE ATTACK SURFACE

Page 17: Reduce your attack surface by getting back to basics

THE FIRST STEP IS THE HARDEST

17 | Confidential

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

Internet

• Most ingenious step (social engineering, clever technical exploit delivery, …)• Much of the attack is happening outside of your control• Requires fancy defense technologies to mitigate

Page 18: Reduce your attack surface by getting back to basics

MAKE LATERAL STEPS HARDER FOR ATTACKER!

18 | Confidential

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

Internet

Step 1 Step 2 Step 3

Step 4 – exfiltrationGame Over

Page 19: Reduce your attack surface by getting back to basics

LATERAL STEPS

• The attacker is now on your turf

• Use your advantages:• Control your network• Know what traffic is usual and what is not

19 | Confidential

Page 20: Reduce your attack surface by getting back to basics

UNUSUAL – IN USUAL WAYS

• Lateral traffic is unusual – in usual ways

• Communicating parties that never communicate

• Protocols & ports that are never used

• Firewalls are really good at blocking such traffic

… as long as:• There are firewalls in the traffic path• The firewalls are properly configured

20 | Confidential

Page 21: Reduce your attack surface by getting back to basics

21 | Confidential

3. NETWORK SEGMENTATION AND SECURITY ZONES

Page 22: Reduce your attack surface by getting back to basics

RECOMMENDATION #1: SEGMENTATION

• Define network zones

• Place firewalls to filter traffic between zones

• Write restrictive policies for traffic between zones

22 | Confidential

Page 23: Reduce your attack surface by getting back to basics

USE TECHNOLOGY YOU KNOW WELL

23 | Confidential

2

3

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

Internet

Page 24: Reduce your attack surface by getting back to basics

USE TECHNOLOGY YOU KNOW WELL

24 | Confidential

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

Internet

Page 25: Reduce your attack surface by getting back to basics

SEGMENT THE NETWORK: INTERNAL FIREWALLS

25 | Confidential

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

Internet

• Place internal firewalls between network zones• Use SDN virtualization technologies to filter traffic inside data center

Page 26: Reduce your attack surface by getting back to basics

ZONES FOR HUMANS

• Humans are the weakest link

• Systems they touch directly are at risk

• Usual communication patterns:• Desktop/Laptop Server• Server Server

• Desktops don’t communicate with other desktops

• Servers don’t initiate connections to desktops

26 | Confidential

Page 27: Reduce your attack surface by getting back to basics

RECOMMENDATION #2: HUMAN-ACCESS ZONES

• Desktops in separate zones from servers• Firewalls between human-access zones and server zones

• Keep different departments in separate zones

27 | Confidential

Page 28: Reduce your attack surface by getting back to basics

RECOMMENDATION #3: SENSITIVE DATA ZONES

• Some types of data are more sensitive• Credit card data (PCI regulation)

• Personally Identifiable Information (GLBA, privacy laws)

• Medical data (HIPAA)

• Financial data (SOX, etc)

• Servers with sensitive data in separate zones

28 | Confidential

Page 29: Reduce your attack surface by getting back to basics

POLICY IN A SEGMENTED NETWORK

• Define the segmentation policy as a matrix:

29 | Confidential

Internal

Network

DMZ Peer’s

DMZ

Page 30: Reduce your attack surface by getting back to basics

ZOOM IN: FROM/TO THE PEER DMZ

30 | Confidential

Internal

Network

DMZ Peer’s

DMZ

Page 31: Reduce your attack surface by getting back to basics

31 | Confidential

4. MANAGING ZONED NETWORKS WITH ALGOSEC

Page 32: Reduce your attack surface by getting back to basics

WORKING WITH A SEGMENTED NETWORK

• Preparation:• Identify the network segments

• Create a segmentation policy matrix (spreadsheet)

• Place internal firewalls / virtualized filters between zones

• Continuous Compliance • Ensure that firewalls enforce the segmentation policy

• Change Requests• Identify all the firewalls that need to be modified• What-if proactive risk check against segmentation policy

32 | Confidential

Page 33: Reduce your attack surface by getting back to basics

IMPORT SEGMENTATION POLICY SPREADSHEET

33 | Confidential

Page 34: Reduce your attack surface by getting back to basics

CONTINUOUS COMPLIANCE

• Daily analysis of all firewalls

34 | Confidential

Page 35: Reduce your attack surface by getting back to basics

CONTINUOUS COMPLIANCE

• Automatically check segmentation policy

35 | Confidential

Page 36: Reduce your attack surface by getting back to basics

CONTINUOUS COMPLIANCE

… and best-practices knowledge base

36 | Confidential

Page 37: Reduce your attack surface by getting back to basics

MAKING A CHANGE REQUEST

37 | Confidential

Page 38: Reduce your attack surface by getting back to basics

AUTOMATICALLY IDENTIFY DEVICES TO MODIFY

38 | Confidential

2 traditional firewalls separate network into zones

Page 39: Reduce your attack surface by getting back to basics

AUTOMATICALLY IDENTIFY DEVICES TO MODIFY

39 | Confidential

VMware NSX firewall filters all traffic inside the datacenter

Page 40: Reduce your attack surface by getting back to basics

EXPLORE PATH DETAILS

40 | Confidential

Page 41: Reduce your attack surface by getting back to basics

WHAT-IF RISK CHECK

• How were the risks checked?

41 | Confidential

Page 42: Reduce your attack surface by getting back to basics

WHAT-IF RISK CHECK

• How were the risks checked?

• Network segmentation matrix!

42 | Confidential

Page 43: Reduce your attack surface by getting back to basics

IMPLEMENT…

• Automatically creates ‘Work Order’ per device

• Implements new rules

… Details in another webinar!43 | Confidential

Page 44: Reduce your attack surface by getting back to basics

SUMMARY

• Attacks requires persistency. Keep an eye out for unusual internal and outbound traffic

• Take control your turf: Make lateral steps within your network harder for attackers• Segment the network• Segment the users

• Segment sensitive data

• Maintain control• Intelligent, structured process for change requests

• Proactively assess risk

• Ensure continuous compliance

44 | Confidential


Recommended