SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Maturity Model of Security Disciplines
Florian Roth
Contents
§ Concept of Maturity Modell of Security Disciplines
§ Some highlights and low hanging fruits
§ Security Monitoring
§ Low hanging fruits
§ Compromise Assessments
§ Threat Intel Management
Maturity Model of Security Disciplines
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Em
ailFilter
Antivirus
Backup
/Restore
SecurityM
onitoring
VulnerabilityM
anagem
ent
M
FA
Advanced
M
alwareDetection
NIDS
EDR
Com
promiseAssessm
ent
Com
puterForensicsRed
Team
ing
ThreatIntelM
anagem
ent
Zero
Trust
SOAR
Implemented Planned Missed
Expensive
Setup Costs
Cheap
DegreeofImplementation
Black Hole
Security Monitoring: Wrong Paradigms
§ „Security devices hold the most important logs“
- Firewall,WAF,VPN logs are less important than you might think
§ „Antivirus events with status ‚successfully removed‘ don‘t matter“
- Better method: Antivirus Event Analysis Cheat Sheet
§ „Only the perimeter matters“
- SSL/TLS connections
- Stage1 is often MS Office Doc with low AV detection rate
§ „If you invest enough in protection you don‘t need a sound
detection“
Security Monitoring: New Paradigms
§ „Assume Compromise“
- Answer the question:
- „what if an attack gained domain admin privileges 6 months ago?“
- „do we detect someone running ‚whoami‘ on one of our servers?“
§ „Githubification of InfoSec“1
- New standards empower community sharing (YARA, Sigma,ATT&CK)
§ „Software is broken“ (not so new but often overlooked ;)
- Always expect vulnerabilities
- Detection is as important as protection and often cheaper to implement
1 https://medium.com/@johnlatwc/the-githubification-of-infosec-afbdbfaad1d1
Security Monitoring
§ Log Collection
§ Log Sources (prioritization)
§ Coverage (degree of implementation)
§ Depths (audit policies)
§ Monitoring
§ Matching
§ IOCs (feeds, management)
§ Methods (Sigma)
§ Correlations
§ Anomaly Detection
§ (Processes)
§ Quality Control
§ MITRE ATT&CK & CAR
§ Red Teaming
Log Sources
Log Source Volume11 IOC Matching Threat Hunting Audit Trail9 APT Detection10
Antivirus Low - ++3 + +++
Windows & Sysmon Medium8 ++1 +++4 ++ ++
Proxy Medium ++2 +5 ++ +
NIDS/NSM7 Medium +2 + + +
DNS High ++2 +5 + +
Mail6 Medium + - + -
Firewall High +2 - ++ -
Linux (auditd) Medium - + + -
1 – File hash values (MD5, SHA1, SHA256)
2 – C2 IPs or domain names
3 – see „Antivirus Event Analysis Cheat Sheet“
4 – Sigma can help a lot
5 – Patterns (URL, hostname), suspicious TLDs
6 – No personal experience with this log source but highly recommended by others
7 – Suricata, Zeek or alike
8 – Depends mainly on audit policy (use Microsoft Baseline) and Sysmon config
Priority
High
Low
9 – Usefulness in reconstruction of events
10 – How useful are these logs in the detection of persistent threats
(reconnaissance, backdoors, lateral movement)
11 – Depends on audit policy and filters (rule of thumb)
Low Hanging Fruit 1: AntiVirus
§ Antivirus Event Analysis
Cheat Sheet
§ Threat Type
§ Location
§ Available as Sigma rules
https://github.com/Neo2
3x0/sigma/tree/master/r
ules/windows/malware
Low Hanging Fruit 2: Sigma
§ Answers the question:
„What should I look for in
my logs?“
§ Generic rules
§ No vendor lock
§ Sharing communities
§ Easy to write and read
§ Expression language covers
95% of use cases (use
explicit queries for the rest)
https://github.com/Neo23x0/sigma/tree/master/rules
Sigma Excursion >
Audit Policies 1/2
§ Antivirus > get everything
§ Windows
§ Microsoft Baseline
§ Sysmon
§ Olaf Hartong‘s „Sysmon Modular“: https://github.com/olafhartong/sysmon-modular
§ SwiftOnSecurity‘s “Sysmon Config“: https://github.com/SwiftOnSecurity/sysmon-config
§ Proxy > get everything
Audit Policies 2/2
§ NIDS > depends on product
§ DNS
§ Exclude AD / Windows service related queries
§ Mail > unknown
§ Firewall
§ High Volume
§ Filter on Priority (see table)
§ Storage: often collected in cheaper systems
Direction Action Priority
Out Blocked High
Out Allowed Medium
In Allowed Medium
In Blocked Low
Advantages of Sysmon/Sigma over EDR
§ Transparency
§ You know exactly what you‘re able to detect
§ No hidden signatures and Machine Learning magic
§ Customizability
§ Independent Response to Threats
§ Community provides detection rules/ideas fast
§ Don‘t have to ask a vendor if he has already pushed
corresponding rules
Security Monitoring: Quality Control
§ MITRE ATT&CK Coverage
§ Don‘t forget the depths:
Webshell Detection isn‘t Webshell Detection
§ Red Teaming
§ It‘s not rocket science - ask:
§ „Do we detect LOCAL_SYSTEM running
‚whoami‘ on one of our servers?“
§ „Do we detect RDP logins with service
accounts?“
§ „Do we detect local admin creations on
Sundays?“
Compromise Assessment
§ Addressing the „Assume Compromise“
paradigm
§ Typically: Consulting + Scripts / Tools1
§ EDR <> Compromise Assessment
§ EDR: Live view of processes, connections, activity
§ CA: Forensic analysis of past events - caches, logs,
error reports, dumps, etc.
§ see it as complementary and not competing
1 e.g. THOR by Nextron Systems
Threat Intel Management
§ Provider: OTX, MISP, Local
Authorities, EclecticIQ,
CrowdStrike, BEA,
Kaspersky, FireEye ...
§ Structures and curated
Threat Intelligence (TI) is a
thing
Source: EclecticIQ

Mais conteúdo relacionado

Mais procurados

Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceDhruv Majumdar
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021Florian Roth
 
Dangling DNS records takeover at scale
Dangling DNS records takeover at scaleDangling DNS records takeover at scale
Dangling DNS records takeover at scaleChandrapal Badshah
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operationsSunny Neo
 
50 Shades of Sigma
50 Shades of Sigma50 Shades of Sigma
50 Shades of SigmaFlorian Roth
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
 
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Six Degrees of Domain Admin - BloodHound at DEF CON 24Six Degrees of Domain Admin - BloodHound at DEF CON 24
Six Degrees of Domain Admin - BloodHound at DEF CON 24Andy Robbins
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentTeymur Kheirkhabarov
 
Security Analyst Workshop - 20190314
Security Analyst Workshop - 20190314Security Analyst Workshop - 20190314
Security Analyst Workshop - 20190314Florian Roth
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghOWASP Delhi
 
Sumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security AnalyticsSumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security AnalyticsSumo Logic
 
Threat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using SplunkThreat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using Splunkjamesmbower
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onSplunk
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsSergey Soldatov
 

Mais procurados (20)

Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
 
Dangling DNS records takeover at scale
Dangling DNS records takeover at scaleDangling DNS records takeover at scale
Dangling DNS records takeover at scale
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Uygulamali Sizma Testi (Pentest) Egitimi Sunumu - 3
Uygulamali Sizma Testi (Pentest) Egitimi Sunumu - 3Uygulamali Sizma Testi (Pentest) Egitimi Sunumu - 3
Uygulamali Sizma Testi (Pentest) Egitimi Sunumu - 3
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 
50 Shades of Sigma
50 Shades of Sigma50 Shades of Sigma
50 Shades of Sigma
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Six Degrees of Domain Admin - BloodHound at DEF CON 24Six Degrees of Domain Admin - BloodHound at DEF CON 24
Six Degrees of Domain Admin - BloodHound at DEF CON 24
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Security Analyst Workshop - 20190314
Security Analyst Workshop - 20190314Security Analyst Workshop - 20190314
Security Analyst Workshop - 20190314
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
Sumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security AnalyticsSumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security Analytics
 
Threat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using SplunkThreat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using Splunk
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
 
ISACA -Threat Hunting using Native Windows tools .pdf
ISACA -Threat Hunting using Native Windows tools .pdfISACA -Threat Hunting using Native Windows tools .pdf
ISACA -Threat Hunting using Native Windows tools .pdf
 

Semelhante a Maturity Model for Implementing Security Disciplines

Blueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfBlueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfFetri Miftach
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseJim Porell
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatMike Saunders
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionBlue Coat
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
FireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slidesFireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slidesAmy Gerrie
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITSMike Saunders
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsOWASP Delhi
 
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMGet Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMRapid7
 
Continuous Monitoring Deck
Continuous Monitoring DeckContinuous Monitoring Deck
Continuous Monitoring DeckBrian Fennimore
 
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunk
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 

Semelhante a Maturity Model for Implementing Security Disciplines (20)

Blueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfBlueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdf
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An Enterprise
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Introduction to threat_modeling
Introduction to threat_modelingIntroduction to threat_modeling
Introduction to threat_modeling
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced Threats
 
FireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slidesFireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slides
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITS
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMGet Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
 
Continuous Monitoring Deck
Continuous Monitoring DeckContinuous Monitoring Deck
Continuous Monitoring Deck
 
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 

Último

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 

Último (20)

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 

Maturity Model for Implementing Security Disciplines

  • 1. Maturity Model of Security Disciplines Florian Roth
  • 2. Contents § Concept of Maturity Modell of Security Disciplines § Some highlights and low hanging fruits § Security Monitoring § Low hanging fruits § Compromise Assessments § Threat Intel Management
  • 3. Maturity Model of Security Disciplines 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Em ailFilter Antivirus Backup /Restore SecurityM onitoring VulnerabilityM anagem ent M FA Advanced M alwareDetection NIDS EDR Com promiseAssessm ent Com puterForensicsRed Team ing ThreatIntelM anagem ent Zero Trust SOAR Implemented Planned Missed Expensive Setup Costs Cheap DegreeofImplementation Black Hole
  • 4. Security Monitoring: Wrong Paradigms § „Security devices hold the most important logs“ - Firewall,WAF,VPN logs are less important than you might think § „Antivirus events with status ‚successfully removed‘ don‘t matter“ - Better method: Antivirus Event Analysis Cheat Sheet § „Only the perimeter matters“ - SSL/TLS connections - Stage1 is often MS Office Doc with low AV detection rate § „If you invest enough in protection you don‘t need a sound detection“
  • 5. Security Monitoring: New Paradigms § „Assume Compromise“ - Answer the question: - „what if an attack gained domain admin privileges 6 months ago?“ - „do we detect someone running ‚whoami‘ on one of our servers?“ § „Githubification of InfoSec“1 - New standards empower community sharing (YARA, Sigma,ATT&CK) § „Software is broken“ (not so new but often overlooked ;) - Always expect vulnerabilities - Detection is as important as protection and often cheaper to implement 1 https://medium.com/@johnlatwc/the-githubification-of-infosec-afbdbfaad1d1
  • 6. Security Monitoring § Log Collection § Log Sources (prioritization) § Coverage (degree of implementation) § Depths (audit policies) § Monitoring § Matching § IOCs (feeds, management) § Methods (Sigma) § Correlations § Anomaly Detection § (Processes) § Quality Control § MITRE ATT&CK & CAR § Red Teaming
  • 7. Log Sources Log Source Volume11 IOC Matching Threat Hunting Audit Trail9 APT Detection10 Antivirus Low - ++3 + +++ Windows & Sysmon Medium8 ++1 +++4 ++ ++ Proxy Medium ++2 +5 ++ + NIDS/NSM7 Medium +2 + + + DNS High ++2 +5 + + Mail6 Medium + - + - Firewall High +2 - ++ - Linux (auditd) Medium - + + - 1 – File hash values (MD5, SHA1, SHA256) 2 – C2 IPs or domain names 3 – see „Antivirus Event Analysis Cheat Sheet“ 4 – Sigma can help a lot 5 – Patterns (URL, hostname), suspicious TLDs 6 – No personal experience with this log source but highly recommended by others 7 – Suricata, Zeek or alike 8 – Depends mainly on audit policy (use Microsoft Baseline) and Sysmon config Priority High Low 9 – Usefulness in reconstruction of events 10 – How useful are these logs in the detection of persistent threats (reconnaissance, backdoors, lateral movement) 11 – Depends on audit policy and filters (rule of thumb)
  • 8. Low Hanging Fruit 1: AntiVirus § Antivirus Event Analysis Cheat Sheet § Threat Type § Location § Available as Sigma rules https://github.com/Neo2 3x0/sigma/tree/master/r ules/windows/malware
  • 9. Low Hanging Fruit 2: Sigma § Answers the question: „What should I look for in my logs?“ § Generic rules § No vendor lock § Sharing communities § Easy to write and read § Expression language covers 95% of use cases (use explicit queries for the rest) https://github.com/Neo23x0/sigma/tree/master/rules
  • 11. Audit Policies 1/2 § Antivirus > get everything § Windows § Microsoft Baseline § Sysmon § Olaf Hartong‘s „Sysmon Modular“: https://github.com/olafhartong/sysmon-modular § SwiftOnSecurity‘s “Sysmon Config“: https://github.com/SwiftOnSecurity/sysmon-config § Proxy > get everything
  • 12. Audit Policies 2/2 § NIDS > depends on product § DNS § Exclude AD / Windows service related queries § Mail > unknown § Firewall § High Volume § Filter on Priority (see table) § Storage: often collected in cheaper systems Direction Action Priority Out Blocked High Out Allowed Medium In Allowed Medium In Blocked Low
  • 13. Advantages of Sysmon/Sigma over EDR § Transparency § You know exactly what you‘re able to detect § No hidden signatures and Machine Learning magic § Customizability § Independent Response to Threats § Community provides detection rules/ideas fast § Don‘t have to ask a vendor if he has already pushed corresponding rules
  • 14. Security Monitoring: Quality Control § MITRE ATT&CK Coverage § Don‘t forget the depths: Webshell Detection isn‘t Webshell Detection § Red Teaming § It‘s not rocket science - ask: § „Do we detect LOCAL_SYSTEM running ‚whoami‘ on one of our servers?“ § „Do we detect RDP logins with service accounts?“ § „Do we detect local admin creations on Sundays?“
  • 15. Compromise Assessment § Addressing the „Assume Compromise“ paradigm § Typically: Consulting + Scripts / Tools1 § EDR <> Compromise Assessment § EDR: Live view of processes, connections, activity § CA: Forensic analysis of past events - caches, logs, error reports, dumps, etc. § see it as complementary and not competing 1 e.g. THOR by Nextron Systems
  • 16. Threat Intel Management § Provider: OTX, MISP, Local Authorities, EclecticIQ, CrowdStrike, BEA, Kaspersky, FireEye ... § Structures and curated Threat Intelligence (TI) is a thing Source: EclecticIQ