SlideShare uma empresa Scribd logo
1 de 91
Beware the
Firewall, My
Son!
The Jaws That Bite,
The Claws That Catch!
The Workshop*
*With apologies to Lewis Carroll
Who Am I?
• Michele Chubirka, aka Mrs. Y.
• Senior security architect.
• Blogs and hosts Healthy
Paranoia, information security
podcast channel of
Packetpushers.
• Researches and pontificates on
topics such as security
architecture and best practices.
Agenda
•
•
•
•
•
•
•

Firewall State of the Union
Current Architectural Models
Challenges
Security Vs. Compliance
Design Recommendations
Case Study
Overcoming Barriers
Let’s Make it Simpler

Why?
What?
How?
Beware the
proxy server,
and shun The
frumious packet
filter!
WHY?
What’s the big deal, can’t I just install a
firewall to protect my organization?
Recent Findings: Trustwave and Verizon
•
•
•

Customer records make up 89% of
breached data.
92% of breaches come from outsiders.
76% of intrusions utilize weak or stolen
credentials.
Death of AV?
• In 2012, SANS and Bruce Schneier publicly criticized
effectiveness of anti-malware protection.
• According to Mikko Hypponen of F-Secure:
“Stuxnet went undetected for more than a year after it
was unleashed in the wild, and was only discovered
after an antivirus firm in Belarus was called in to look
at machines in Iran that were having problems.”
Are You Depressed Yet?

The most common password used by
organizations is “Password1” because it
satisfies the default Microsoft Active
Directory complexity setting.
Trustwave 2012 Global Security
Report
Only 16% of
compromises
were selfdetected and
attackers had
an average of
173.5 days
before
detection.
Verizon Data Breach Report 2013
“…three-quarters of breaches
are of low or very low difficulty
for initial compromise, and the
rest land in the moderate
category.”
Verizon Data Breach Investigations Report 2013
Verizon Data Breach Investigations Report 2013
Verizon Data Breach Investigations Report 2013
Verizon Data Breach Report 2013
“When you consider the methods used by attackers
to gain a foothold in organizations—brute force,
stolen creds, phishing, tampering—it’s really not all
that surprising that none receive the highly difficult
rating. Would you fire a guided missile at an
unlocked screen door?”
High Profile Attacks
• Major news media organizations compromised.
• DDoS attacks against financial institutions.
• Breach of credit card processor Global Payments
went undetected for over a year with 7 million
accounts compromised.
• Prominent defense contractors penetrated via
information stolen from RSA Security.

Do you think they had firewalls?
"The entire security industry is wired so
that the oldest and least effective methods
will profit most….”
Josh Corman, Director of Security
Intelligence at Akamai, the content delivery
network.
Why Do We Say We Use Firewalls?
• Infosec design “best practice.”
• Because compliance rules and auditors say so.
• To protect data, applications, servers and users
from attacks.
Why Do We Really Use Firewalls?

FUD
(Fear, Uncertainty and Doubt)
Why Do We Still Use Firewalls?
According to Infoworld’s Roger Grimes, they “…
need to go away.”
•Most attacks are client-side (http and https) and
can bypass the firewall rules.
•Network choke-points.
•Rules are a mess, often breaking access.
•Management is difficult, at best.
•More of a problem than a solution.
Why Do You Hate Firewalls?

I don’t hate
firewalls.
I hate how we use
them.
April Fool’s RFC 3514
Firewalls [CBR03], packet filters, intrusion
detection systems, and the like often have difficulty
distinguishing between packets that have
malicious intent and those that are merely unusual.
The problem is that making such determinations is
hard. To solve this problem, we define a security
flag, known as the "evil" bit, in the IPv4 [RFC791]
header.
April Fool’s RFC 3093
We propose the Firewall Enhancement Protocol
(FEP).… Our methodology is to layer any
application layer Transmission Control
Protocol/User Datagram Protocol (TCP/UDP)
packets over the HyperText Transfer Protocol
(HTTP) protocol, since HTTP packets are typically
able to transit Firewalls. … FEP allows the best of
both worlds: the security of a firewall, and
transparent tunneling through the firewall.
Questions?
WHAT?
She took her
vorpal sword in
hand:
  Long time the
TCP flow she
sought --
Definitions Con’t
Firewall
From The Oxford American Dictionary:
A wall or partition designed to inhibit or prevent
the spread of fire. Any barrier that is intended to
thwart the spread of a destructive agent.

A firewall does not prevent a fire.
So rested she by
the DMZ,
  And stood
awhile in
thought.
Current Model: The Sandwich
Typical Network Security Segmentation
INET : Public facing, the internet.
CORP : Corporate network, your user community.
DATA : Database systems
APP: Applications
DMZ : Anything requiring public access; web-front ends,
mail, DNS
MGMT : management segment
PCI or other compliance standards are usually wedged in
somewhere as an afterthought.
Typical Data Classification Model

•
•
•
•

Routine or Public
Sensitive
Private
Business-Critical or Confidential
Routine or Public
Information not presenting a risk to the business if it
were compromised. The lowest degree of protection.
Examples
•Master list of projects
•Employee names associated with public projects or
documents
Sensitive
Information not of specific value to an attacker, but it
might provide information that could be useful in an
attack.
Examples:
•Details of a project
•Employee email addresses
•Types of applications used internally
Private
Personal information that the organization is required
to keep secure, either by regulation or to maintain the
confidence of its customers. Disclosure could impact
reputation of company.
Examples:
•Credit card information
•Medical data
Business-Critical or Confidential
Internal data containing details about how the
organization operates its business. Could affect the
organization's competitive advantage or have a
financial impact if it were compromised.
Examples:
•Intellectual property
•Source code
What You Really Get
And, as in
uffish thought
she stood,
The firewall,
with eyes of
flame,
Data Owner
Member of the management team who makes
decisions regarding data and is ultimately responsible
for ensuring its protection.
Data Custodian
Individual, usually in the security department, who is
a delegate appointed by the data owner to oversee
the protection of data. The responsibilities of this role
could also be divided between various roles in an
operations team.
The Challenge
• The data owner is responsible for classifying
information within an organization.
• A Security team is responsible for managing the
technical or logical controls for accessing data.
• They are data custodians for the data owners.
• The challenge is to ensure that they closely
align the network security segmentation design
with an information classification matrix.
Came whiffling through the Ethernet,
And burbled as it came!
Security Vs. Compliance
• Adherence to PCI-DSS, SOX, HIPAA or any other
compliance standard does not equate to
organizational security.
• Compliance is conformance to a standard dictated
by a governing body.
Definitions
Compliance - the act of conforming, acquiescing, or yielding. A
tendency to yield readily to others, especially in a weak and
subservient way. Conformity; accordance: in compliance with
orders. Cooperation or obedience.

From The American Heritage Dictionary
Definitions
Security - freedom from danger, risk, etc.; safety.
Freedom from care, anxiety, or doubt; well-founded
confidence. Something that secures or makes safe;
protection; defense. Precautions taken to guard against
crime, attack, sabotage, espionage, etc.

From The American Heritage Dictionary
Compliance != Security

Venn diagram courtesy of @grecs
The Auditor Is Not Your Friend
Questions?
HOW?

Emphasize strategic
solutions over tactical
ones.
One, two! One,
two! And
through and
through
  The vorpal
blade went
snicker-snack!
Elements of a Good Security Design

• Well-documented data classification model
• Business service catalog
• Technical service catalog
Information Classification Best Practices
• Data represents the digital assets of a company.
• Different data has varying levels of value, organized
according to sensitivity to loss, disclosure, or unavailability.
• Data is segmented according to level, then security controls
are applied.
• An information classification matrix represents the
foundation of a security design.
For additional information, see “Understanding Data
Classification Based On Business and Security
Requirements” by Rafael Etges and Karen McNeil
The Goal: Enterprise Security Architecture
• Integration of security into the enterprise
architecture.
• Design driven by business needs.
• Built in, not bolted on.
• Utilize frameworks or models such as:
OSA (Open Security Architecture)
SABSA (Sherwood Applied Business
Security Architecture)
Definition
Security Architecture
“…the art and science of designing and supervising the
construction of business systems, usually business
information systems, which are: free from danger,
damage, etc.; free from fear, care, etc.; in safe
custody; not likely to fail; able to be relied upon; safe
from attack.”
From Enterprise Security Architecture: A
Business-Driven Approach
OSA Design Principles

The design artifacts that describe how the security controls (=
security countermeasures) are positioned, and how they relate to
the overall IT Architecture.
A New and Improved DMZ Sandwich

http://www.opensecurityarchitecture.org/cms/images/OSA_ima...

AU-02 Auditable Events
AU-03 Content Of Audit
Records
AU-04 Audit Storage
Capacity

AC-04 Information Flow
Enforcement

SC-10 Network Disconnect

AU-11

Audit Record
Retention

AC-06 Least Privilege

SC-23 Session Authenticity

AC-12 Session Termination

SI-03 Malicious Code
Protection

CM-07 Least Functionality

SI-08 Spam Protection

AU-10 Non-Repudiat ion

SC-05

Denial Of Service
Protection

AU-05 Response To Audit
Processing Failures

SI-06

Security
Functionality Verif..

AU-06 Audit Monitoring,
Analysis, And Repor..

SI-07 Software And
Information Integri..

AU-08 Time Stamps
AU-09 Protection Of Audit
Information

Proxy/Gateway/Web
-minimal services
-hardened configuration
-management/monitoring
by seperate network
interfaces/VLAN
Internal
Services

External
Services

Untrusted public network
e.g. Internet

Default rule: DENY ALL
Enable specific port
and IP addresses.
Stateful inspection and
DOS protection
Load balance/High
availability

External
Firewall

SC-07 Boundary Protection

Internal
Firewall

Bastion
Host

DNS
SC-20 Secure Name /
Address Resolution ..

IDS/IPS

Trusted network
e.g. CorpNet

Default rule: DENY ALL
Enable specific port
and IP addresses/ranges
Stateful inspection

System
SI-04 InformationTools An..
Monitoring

SC-21 Secure Name /
Address Resolution ..
SC-22 Architecture And Na..
Provisioning For

AC-07 Unsuccessful Login
Attempts

http://www.opensecurityarchitecture.org/c
ms/en/library/patternlandscape/286-sp-016dmz-module
OSA is licensed according to Creative Commons Share-alike.
Please see:http://www.opensecurityarchitecture.org/cms/about/license-terms.

AU-07 Audit Reduction And
Report Generation

Actor: Security Operations
Configuration of
environment
Monitoring and response
to emerging threats

CA-03 Information System
Connections
CA-04 Security
Certification
CA-05 Plan Of Action And
Milestones
RA-05 Vulnerability
Scanning
SI-05 Security Alerts And
Advisories
SABSA Overview
SABSA Model
Contextual Layer – Business policymaking, risk assessment,
requirements collection and specification.
Conceptual Layer – Programs for training and awareness,
business continuity, audit/review, process development,
standards and procedures.
Logical Layer – Security policymaking, classification,
management of security services, audit trail monitoring.
Physical Layer – Development and execution of security rules,
practices and procedures.
Component Layer – Products, technology, evaluation and
selection of standards and tools, project management.
SABSA Matrix
Security Architecture Lifecycle
Form Follows Function
•What's the purpose of the structure? Who must it
serve?
•What's the environment like? Is it closed or open?
What is the context?
•Complex or simple? Think of the technical environment
and the capabilities of those involved.
Definitions
Defense-in-depth
According to the Committee on National Security
Systems Instruction No. 4009, National Information
Assurance Glossary, it is defined as:
IA [information assurance] strategy integrating
people, technology, and operations capabilities to
establish variable barriers across multiple layers
and dimensions of networks.
Defense-in-depth is comprised of
multiple types of controls, not only
multiples of the same controls.
Multi-Layered Security
1. Information Assets
2. Data Security
3. Application Software Security
4. System Software Security
5. Hardware Security
6. Physical Security
7. Procedures, Training, Audit, Business Continuity
8. Policy
It is like an onion!
Security Service Types
•
•
•
•
•
•

Prevention
Containment
Detection and notification
Event collection and event tracking
Recovery and restoration
Assurance
Think in terms of services, not products or solutions.
You need to consider all when addressing
requirements.
Security as an enabler of
business, not a roadblock.
“Consider the brakes on a car…. having better brakes
enables the car to be driven at much higher speeds,
because the driver now has the confidence that if the
need arises, braking will be fast and efficient.”
From Enterprise Security Architecture: A
Business-Driven Approach
She left it dead, and with its NAT
policy, she went galumphing back.
Implementing Good Network
Segmentation: Phase One
1. Establish a new network segmentation model, based upon
some of the existing or implicit standards from your
security team.
2. Verify that this will meet current compliance needs,
proactively.
3. Document this fully and get sign off, so that there is an
agreed upon model or standard for all divisions.
4. Build new systems and networks on this design, migrating
legacy systems where possible with minimal impact to
customers and when required for compliance.
Implementing Good Network
Segmentation: Phase Two
1. Build a business and service technical catalog, then a full
data classification matrix.
2. Develop the next generation of network segmentation
based upon the data classification matrix.
3. Document this fully, so that there is an agreed upon
model or standard.
Implementation of phase one, will make phase two feasible.
The goal is a thoughtful design that meets the needs of all
customers and divisions within an organization.
Case Study: Recovery from PCI-DSS
Audit Failure
1.
2.
3.
4.

Inventory of the cardholder data environment (CDE).
Data classification.
User classification.
Proposed segmentation based upon the intersection
of users and data.
5. Documentation of business rules.
Warning:
You will experience PCI scope creep. Think of anything
touching the CDE as contaminated and plan
accordingly.
Now for the Real Challenge
Prevention is a hard sell.
A NEW KIND OF INGRATITUDE
Who gets rewarded, the central banker who avoids a
recession or the one who comes to "correct" his
predecessors' faults and happens to be there during
some economic recovery?
...everybody knows that you need more prevention than
treatment, but few reward acts of prevention. …We
humans are not just a superficial race (this may be
curable to some extent); we are a very unfair one.
-from “The Black Swan” by Nassim Taleb
Selling the Design
• The WAY we present information is just as important
as WHAT we present.
• In the first few minutes we interact with someone,
we’re being assessed for our potential to provide
reward or punishment.
The Threat Response
• Cortex receives input.
• Limbic system, the emotional area, and prefrontal
cortex (the executive or evaluator of the brain)
take in data simultaneously.
• Amygdala, responsible for emotional response and
memory, acts as an alarm activating fight/flight
response if threat is perceived.
• Sympathetic nervous system sets up organs and
muscles for fight/flight response.
Key Concepts
• The limbic system is an “open loop,” influenced by
other people’s emotions, aka mirror neurons. Also
known as emotional contagion.
• The brain has a negativity bias because the limbic
system is quicker than the prefrontal cortex at
perceiving and analyzing potential threats.
• Traumatic experiences are “stickier” than positive,
happy experiences, i.e. harder to un-map.
No Escape From Threat
• Most of us are in a permanent state of cortisol
overload due to the constant stressors of modern life
and the fact that stress hormones stay in the body
for hours.
• This decreases intellectual capacity, memory
capacity and lowers impulse control.
• Stress makes you stupid.
Amygdala Hijack

Intense and immediate emotional reaction, followed
by the understanding that it was inappropriate.
Examples
• I thought that stick on the ground was a snake!
• I don’t like you or I’m bored, so I won’t cooperate or
listen to what you have to say.
• That guy who cut me off in traffic was trying to kill
me!
• Why were you so insulting to me in that email
yesterday? (studies show there’s a negativity bias in
email.)
Thin Slicing: Bedside Manner
• In an analysis of malpractice lawsuits, there was no
correlation between the number of mistakes by
doctors and how many lawsuits were filed against
them.
• In studies, psychologists were able to predict which
doctors would be sued more by analyzing the
amount of time spent with patients and if the tone of
their voices sounded “concerned.”
Mirror Neurons
Marie Dasborough observed two groups:
•One group was given negative feedback accompanied
by positive emotional signs, nods and smiles.
•Another was provided positive feedback that was
delivered using negative emotional cues, frowns and
narrowed eyes.
Entrainment
• Those who received the positive feedback
accompanied by negative emotional signs reported
that they felt worse than participants who received
negative feedback given with positive emotional
cues.
• Delivery was more important than the message.
• This is similar to a phenomenon known in physics as
entrainment.
Conflict Avoidance != Conflict
Resolution
“…conflicts are like fish, and if you put this fish under
the table, what happens after a while? It starts to
smell.”
- George Kohlrieser
By addressing conflict through respectful methods,
opposition can be transformed into an engaged
dialogue.
You’re Ready,
Right?
Operational Security To Do List
• Focus on containment.
• Improve standardization and documentation.
• Gather metrics. If you can’t measure, you can’t
demonstrate value.
• Visibility and monitoring (and no, that doesn’t
mean email alerts).
• Consistently audit access.
• Emphasize a proactive over reactive posture.
• Be a partner to the business.
Warning!

Don’t implement
solutions before
understanding the
problem.
And, has thou slain the Firewall?
 Come to my arms, my beamish girl!

O stateful day! Callooh! Callay!'
  She chortled in her joy.
Questions?
Where Am I?
Spending quality time in kernel mode practicing and
refining my particular form of snark.
www.healthyparanoia.net
Twitter @MrsYisWhy
Google+ MrsYisWhy
networksecurityprincess@gmail.com
chubirka@packetpushers.net
http://www.networkcomputing.com/blogs/author/Mich
ele-Chubirka
References
Covert, Edwin. Using Enterprise Security Architecture S to Align
Business Goals and IT Security within an Organization. Tech.
Columbia: Applied Network Solutions, n.d. Print.
Gladwell, Malcolm. Blink: The Power of Thinking without Thinking. New
York: Little, Brown and, 2005. Print.
Goleman, Daniel, and Richard Boyatzis. "Social Intelligence and
Biology of Leadership." Harvard Business Review (2008): n. pag. Web.
Goleman, Daniel. Working with Emotional Intelligence. New York:
Bantam, 1998. Print.
Grimes, Roger. "Why You Don't Need a Firewall." InfoWorld. N.p., 15
May 2012. Web. 15 May 2012.
<http://www.infoworld.com/d/security/why-you-dont-need-firewall193153?page=0,1>.
Harris, Shon. CISSP Exam Guide. Berkeley, CA: Osborne, 2012. Print.
References Con’t
Krebs, Brian. "Krebs on Security." Krebs on Security RSS. N.p., 1 May 2012. Web.
16 Apr. 2013. <http://krebsonsecurity.com/2012/05/global-payments-breachwindow-expands/>.
Krebs, Brian. "Krebs on Security." Krebs on Security RSS. N.p., 17 May 2012. Web.
16 Apr. 2013. <http://krebsonsecurity.com/2012/05/global-payments-breachnow-dates-back-to-jan-2011/>.
Lee, Rob. "Blog." Is Anti-Virus Really Dead? A Real-World Simulation Created for
Forensic Data Yields Surprising Results. SANS, 9 Apr. 2012. Web. 16 Apr. 2013.
http://computer-forensics.sans.org/blog/2012/04/09/is-anti-virus-really-dead-areal-world-simulation-created-for-forensic-data-yields-surprising-results.
"Open Security Architecture." Open Security Architecture. N.p., n.d. Web. 17 Apr.
2013.
Plato, Andrew. "Analysis of the Palo Alto Cache Poison Issue." Anitian Blog. Antian
Security, 3 Jan. 2013. Web. 16 Apr. 2013.
"SABSA." SABSA. N.p., n.d. Web. 17 Apr. 2013.
References Con’t
Sherwood, John, Andrew Clark, and David Lynas. Enterprise Security Architecture: A
Business-driven Approach. San Francisco: CMP, 2005. Print.
Trustwave 2012 Global Security Report. Rep. Trustwave, 2012. Web.
Verizon 2013 Data Breach Investigations Report. Rep. Verizon, 2013. Web.
Wan, William, and Ellen Nakashima. "Report Ties Cyberattacks on U.S. Computers to
Chinese Military." Washington Post. The Washington Post, 19 Feb. 2013. Web. 16 Apr.
2013. <http://www.washingtonpost.com/world/report-ties-100-plus-cyber-attacks-onus-computers-to-chinese-military/2013/02/19/2700228e-7a6a-11e2-9a75dab0201670da_story.html>.
Zetter, Kim. "RSA Agrees to Replace Security Tokens After Admitting Compromise."
Wired.com. Conde Nast Digital, 05 June 0011. Web. 16 Apr. 2013.
<http://www.wired.com/threatlevel/2011/06/rsa-replaces-securid-tokens/>.

Mais conteúdo relacionado

Mais procurados

A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
Symantec
 

Mais procurados (20)

5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 

Semelhante a Beware the Firewall My Son: The Workshop

Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
Alert Logic
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 

Semelhante a Beware the Firewall My Son: The Workshop (20)

Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
SecurityOperations
SecurityOperationsSecurityOperations
SecurityOperations
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Beware the Firewall My Son: The Workshop

  • 1. Beware the Firewall, My Son! The Jaws That Bite, The Claws That Catch! The Workshop* *With apologies to Lewis Carroll
  • 2. Who Am I? • Michele Chubirka, aka Mrs. Y. • Senior security architect. • Blogs and hosts Healthy Paranoia, information security podcast channel of Packetpushers. • Researches and pontificates on topics such as security architecture and best practices.
  • 3. Agenda • • • • • • • Firewall State of the Union Current Architectural Models Challenges Security Vs. Compliance Design Recommendations Case Study Overcoming Barriers
  • 4. Let’s Make it Simpler Why? What? How?
  • 5. Beware the proxy server, and shun The frumious packet filter!
  • 6. WHY? What’s the big deal, can’t I just install a firewall to protect my organization?
  • 7. Recent Findings: Trustwave and Verizon • • • Customer records make up 89% of breached data. 92% of breaches come from outsiders. 76% of intrusions utilize weak or stolen credentials.
  • 8. Death of AV? • In 2012, SANS and Bruce Schneier publicly criticized effectiveness of anti-malware protection. • According to Mikko Hypponen of F-Secure: “Stuxnet went undetected for more than a year after it was unleashed in the wild, and was only discovered after an antivirus firm in Belarus was called in to look at machines in Iran that were having problems.”
  • 9. Are You Depressed Yet? The most common password used by organizations is “Password1” because it satisfies the default Microsoft Active Directory complexity setting.
  • 10. Trustwave 2012 Global Security Report Only 16% of compromises were selfdetected and attackers had an average of 173.5 days before detection.
  • 11. Verizon Data Breach Report 2013 “…three-quarters of breaches are of low or very low difficulty for initial compromise, and the rest land in the moderate category.”
  • 12. Verizon Data Breach Investigations Report 2013
  • 13. Verizon Data Breach Investigations Report 2013
  • 14. Verizon Data Breach Investigations Report 2013
  • 15. Verizon Data Breach Report 2013 “When you consider the methods used by attackers to gain a foothold in organizations—brute force, stolen creds, phishing, tampering—it’s really not all that surprising that none receive the highly difficult rating. Would you fire a guided missile at an unlocked screen door?”
  • 16. High Profile Attacks • Major news media organizations compromised. • DDoS attacks against financial institutions. • Breach of credit card processor Global Payments went undetected for over a year with 7 million accounts compromised. • Prominent defense contractors penetrated via information stolen from RSA Security. Do you think they had firewalls?
  • 17. "The entire security industry is wired so that the oldest and least effective methods will profit most….” Josh Corman, Director of Security Intelligence at Akamai, the content delivery network.
  • 18. Why Do We Say We Use Firewalls? • Infosec design “best practice.” • Because compliance rules and auditors say so. • To protect data, applications, servers and users from attacks.
  • 19. Why Do We Really Use Firewalls? FUD (Fear, Uncertainty and Doubt)
  • 20. Why Do We Still Use Firewalls? According to Infoworld’s Roger Grimes, they “… need to go away.” •Most attacks are client-side (http and https) and can bypass the firewall rules. •Network choke-points. •Rules are a mess, often breaking access. •Management is difficult, at best. •More of a problem than a solution.
  • 21. Why Do You Hate Firewalls? I don’t hate firewalls. I hate how we use them.
  • 22. April Fool’s RFC 3514 Firewalls [CBR03], packet filters, intrusion detection systems, and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. The problem is that making such determinations is hard. To solve this problem, we define a security flag, known as the "evil" bit, in the IPv4 [RFC791] header.
  • 23. April Fool’s RFC 3093 We propose the Firewall Enhancement Protocol (FEP).… Our methodology is to layer any application layer Transmission Control Protocol/User Datagram Protocol (TCP/UDP) packets over the HyperText Transfer Protocol (HTTP) protocol, since HTTP packets are typically able to transit Firewalls. … FEP allows the best of both worlds: the security of a firewall, and transparent tunneling through the firewall.
  • 25. WHAT?
  • 26. She took her vorpal sword in hand:   Long time the TCP flow she sought --
  • 27. Definitions Con’t Firewall From The Oxford American Dictionary: A wall or partition designed to inhibit or prevent the spread of fire. Any barrier that is intended to thwart the spread of a destructive agent. A firewall does not prevent a fire.
  • 28. So rested she by the DMZ,   And stood awhile in thought.
  • 29. Current Model: The Sandwich
  • 30. Typical Network Security Segmentation INET : Public facing, the internet. CORP : Corporate network, your user community. DATA : Database systems APP: Applications DMZ : Anything requiring public access; web-front ends, mail, DNS MGMT : management segment PCI or other compliance standards are usually wedged in somewhere as an afterthought.
  • 31. Typical Data Classification Model • • • • Routine or Public Sensitive Private Business-Critical or Confidential
  • 32. Routine or Public Information not presenting a risk to the business if it were compromised. The lowest degree of protection. Examples •Master list of projects •Employee names associated with public projects or documents
  • 33. Sensitive Information not of specific value to an attacker, but it might provide information that could be useful in an attack. Examples: •Details of a project •Employee email addresses •Types of applications used internally
  • 34. Private Personal information that the organization is required to keep secure, either by regulation or to maintain the confidence of its customers. Disclosure could impact reputation of company. Examples: •Credit card information •Medical data
  • 35. Business-Critical or Confidential Internal data containing details about how the organization operates its business. Could affect the organization's competitive advantage or have a financial impact if it were compromised. Examples: •Intellectual property •Source code
  • 37. And, as in uffish thought she stood, The firewall, with eyes of flame,
  • 38. Data Owner Member of the management team who makes decisions regarding data and is ultimately responsible for ensuring its protection.
  • 39. Data Custodian Individual, usually in the security department, who is a delegate appointed by the data owner to oversee the protection of data. The responsibilities of this role could also be divided between various roles in an operations team.
  • 40. The Challenge • The data owner is responsible for classifying information within an organization. • A Security team is responsible for managing the technical or logical controls for accessing data. • They are data custodians for the data owners. • The challenge is to ensure that they closely align the network security segmentation design with an information classification matrix.
  • 41. Came whiffling through the Ethernet, And burbled as it came!
  • 42. Security Vs. Compliance • Adherence to PCI-DSS, SOX, HIPAA or any other compliance standard does not equate to organizational security. • Compliance is conformance to a standard dictated by a governing body.
  • 43. Definitions Compliance - the act of conforming, acquiescing, or yielding. A tendency to yield readily to others, especially in a weak and subservient way. Conformity; accordance: in compliance with orders. Cooperation or obedience. From The American Heritage Dictionary
  • 44. Definitions Security - freedom from danger, risk, etc.; safety. Freedom from care, anxiety, or doubt; well-founded confidence. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. From The American Heritage Dictionary
  • 45. Compliance != Security Venn diagram courtesy of @grecs
  • 46. The Auditor Is Not Your Friend
  • 49. One, two! One, two! And through and through   The vorpal blade went snicker-snack!
  • 50. Elements of a Good Security Design • Well-documented data classification model • Business service catalog • Technical service catalog
  • 51. Information Classification Best Practices • Data represents the digital assets of a company. • Different data has varying levels of value, organized according to sensitivity to loss, disclosure, or unavailability. • Data is segmented according to level, then security controls are applied. • An information classification matrix represents the foundation of a security design. For additional information, see “Understanding Data Classification Based On Business and Security Requirements” by Rafael Etges and Karen McNeil
  • 52. The Goal: Enterprise Security Architecture • Integration of security into the enterprise architecture. • Design driven by business needs. • Built in, not bolted on. • Utilize frameworks or models such as: OSA (Open Security Architecture) SABSA (Sherwood Applied Business Security Architecture)
  • 53. Definition Security Architecture “…the art and science of designing and supervising the construction of business systems, usually business information systems, which are: free from danger, damage, etc.; free from fear, care, etc.; in safe custody; not likely to fail; able to be relied upon; safe from attack.” From Enterprise Security Architecture: A Business-Driven Approach
  • 54. OSA Design Principles The design artifacts that describe how the security controls (= security countermeasures) are positioned, and how they relate to the overall IT Architecture.
  • 55. A New and Improved DMZ Sandwich http://www.opensecurityarchitecture.org/cms/images/OSA_ima... AU-02 Auditable Events AU-03 Content Of Audit Records AU-04 Audit Storage Capacity AC-04 Information Flow Enforcement SC-10 Network Disconnect AU-11 Audit Record Retention AC-06 Least Privilege SC-23 Session Authenticity AC-12 Session Termination SI-03 Malicious Code Protection CM-07 Least Functionality SI-08 Spam Protection AU-10 Non-Repudiat ion SC-05 Denial Of Service Protection AU-05 Response To Audit Processing Failures SI-06 Security Functionality Verif.. AU-06 Audit Monitoring, Analysis, And Repor.. SI-07 Software And Information Integri.. AU-08 Time Stamps AU-09 Protection Of Audit Information Proxy/Gateway/Web -minimal services -hardened configuration -management/monitoring by seperate network interfaces/VLAN Internal Services External Services Untrusted public network e.g. Internet Default rule: DENY ALL Enable specific port and IP addresses. Stateful inspection and DOS protection Load balance/High availability External Firewall SC-07 Boundary Protection Internal Firewall Bastion Host DNS SC-20 Secure Name / Address Resolution .. IDS/IPS Trusted network e.g. CorpNet Default rule: DENY ALL Enable specific port and IP addresses/ranges Stateful inspection System SI-04 InformationTools An.. Monitoring SC-21 Secure Name / Address Resolution .. SC-22 Architecture And Na.. Provisioning For AC-07 Unsuccessful Login Attempts http://www.opensecurityarchitecture.org/c ms/en/library/patternlandscape/286-sp-016dmz-module OSA is licensed according to Creative Commons Share-alike. Please see:http://www.opensecurityarchitecture.org/cms/about/license-terms. AU-07 Audit Reduction And Report Generation Actor: Security Operations Configuration of environment Monitoring and response to emerging threats CA-03 Information System Connections CA-04 Security Certification CA-05 Plan Of Action And Milestones RA-05 Vulnerability Scanning SI-05 Security Alerts And Advisories
  • 57. SABSA Model Contextual Layer – Business policymaking, risk assessment, requirements collection and specification. Conceptual Layer – Programs for training and awareness, business continuity, audit/review, process development, standards and procedures. Logical Layer – Security policymaking, classification, management of security services, audit trail monitoring. Physical Layer – Development and execution of security rules, practices and procedures. Component Layer – Products, technology, evaluation and selection of standards and tools, project management.
  • 60. Form Follows Function •What's the purpose of the structure? Who must it serve? •What's the environment like? Is it closed or open? What is the context? •Complex or simple? Think of the technical environment and the capabilities of those involved.
  • 61. Definitions Defense-in-depth According to the Committee on National Security Systems Instruction No. 4009, National Information Assurance Glossary, it is defined as: IA [information assurance] strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and dimensions of networks.
  • 62. Defense-in-depth is comprised of multiple types of controls, not only multiples of the same controls.
  • 63. Multi-Layered Security 1. Information Assets 2. Data Security 3. Application Software Security 4. System Software Security 5. Hardware Security 6. Physical Security 7. Procedures, Training, Audit, Business Continuity 8. Policy It is like an onion!
  • 64. Security Service Types • • • • • • Prevention Containment Detection and notification Event collection and event tracking Recovery and restoration Assurance Think in terms of services, not products or solutions. You need to consider all when addressing requirements.
  • 65. Security as an enabler of business, not a roadblock. “Consider the brakes on a car…. having better brakes enables the car to be driven at much higher speeds, because the driver now has the confidence that if the need arises, braking will be fast and efficient.” From Enterprise Security Architecture: A Business-Driven Approach
  • 66. She left it dead, and with its NAT policy, she went galumphing back.
  • 67. Implementing Good Network Segmentation: Phase One 1. Establish a new network segmentation model, based upon some of the existing or implicit standards from your security team. 2. Verify that this will meet current compliance needs, proactively. 3. Document this fully and get sign off, so that there is an agreed upon model or standard for all divisions. 4. Build new systems and networks on this design, migrating legacy systems where possible with minimal impact to customers and when required for compliance.
  • 68. Implementing Good Network Segmentation: Phase Two 1. Build a business and service technical catalog, then a full data classification matrix. 2. Develop the next generation of network segmentation based upon the data classification matrix. 3. Document this fully, so that there is an agreed upon model or standard. Implementation of phase one, will make phase two feasible. The goal is a thoughtful design that meets the needs of all customers and divisions within an organization.
  • 69. Case Study: Recovery from PCI-DSS Audit Failure 1. 2. 3. 4. Inventory of the cardholder data environment (CDE). Data classification. User classification. Proposed segmentation based upon the intersection of users and data. 5. Documentation of business rules. Warning: You will experience PCI scope creep. Think of anything touching the CDE as contaminated and plan accordingly.
  • 70. Now for the Real Challenge
  • 71. Prevention is a hard sell.
  • 72. A NEW KIND OF INGRATITUDE Who gets rewarded, the central banker who avoids a recession or the one who comes to "correct" his predecessors' faults and happens to be there during some economic recovery? ...everybody knows that you need more prevention than treatment, but few reward acts of prevention. …We humans are not just a superficial race (this may be curable to some extent); we are a very unfair one. -from “The Black Swan” by Nassim Taleb
  • 73. Selling the Design • The WAY we present information is just as important as WHAT we present. • In the first few minutes we interact with someone, we’re being assessed for our potential to provide reward or punishment.
  • 74. The Threat Response • Cortex receives input. • Limbic system, the emotional area, and prefrontal cortex (the executive or evaluator of the brain) take in data simultaneously. • Amygdala, responsible for emotional response and memory, acts as an alarm activating fight/flight response if threat is perceived. • Sympathetic nervous system sets up organs and muscles for fight/flight response.
  • 75. Key Concepts • The limbic system is an “open loop,” influenced by other people’s emotions, aka mirror neurons. Also known as emotional contagion. • The brain has a negativity bias because the limbic system is quicker than the prefrontal cortex at perceiving and analyzing potential threats. • Traumatic experiences are “stickier” than positive, happy experiences, i.e. harder to un-map.
  • 76. No Escape From Threat • Most of us are in a permanent state of cortisol overload due to the constant stressors of modern life and the fact that stress hormones stay in the body for hours. • This decreases intellectual capacity, memory capacity and lowers impulse control. • Stress makes you stupid.
  • 77. Amygdala Hijack Intense and immediate emotional reaction, followed by the understanding that it was inappropriate.
  • 78. Examples • I thought that stick on the ground was a snake! • I don’t like you or I’m bored, so I won’t cooperate or listen to what you have to say. • That guy who cut me off in traffic was trying to kill me! • Why were you so insulting to me in that email yesterday? (studies show there’s a negativity bias in email.)
  • 79. Thin Slicing: Bedside Manner • In an analysis of malpractice lawsuits, there was no correlation between the number of mistakes by doctors and how many lawsuits were filed against them. • In studies, psychologists were able to predict which doctors would be sued more by analyzing the amount of time spent with patients and if the tone of their voices sounded “concerned.”
  • 80. Mirror Neurons Marie Dasborough observed two groups: •One group was given negative feedback accompanied by positive emotional signs, nods and smiles. •Another was provided positive feedback that was delivered using negative emotional cues, frowns and narrowed eyes.
  • 81. Entrainment • Those who received the positive feedback accompanied by negative emotional signs reported that they felt worse than participants who received negative feedback given with positive emotional cues. • Delivery was more important than the message. • This is similar to a phenomenon known in physics as entrainment.
  • 82. Conflict Avoidance != Conflict Resolution “…conflicts are like fish, and if you put this fish under the table, what happens after a while? It starts to smell.” - George Kohlrieser By addressing conflict through respectful methods, opposition can be transformed into an engaged dialogue.
  • 84. Operational Security To Do List • Focus on containment. • Improve standardization and documentation. • Gather metrics. If you can’t measure, you can’t demonstrate value. • Visibility and monitoring (and no, that doesn’t mean email alerts). • Consistently audit access. • Emphasize a proactive over reactive posture. • Be a partner to the business.
  • 86. And, has thou slain the Firewall?  Come to my arms, my beamish girl! O stateful day! Callooh! Callay!'   She chortled in her joy.
  • 88. Where Am I? Spending quality time in kernel mode practicing and refining my particular form of snark. www.healthyparanoia.net Twitter @MrsYisWhy Google+ MrsYisWhy networksecurityprincess@gmail.com chubirka@packetpushers.net http://www.networkcomputing.com/blogs/author/Mich ele-Chubirka
  • 89. References Covert, Edwin. Using Enterprise Security Architecture S to Align Business Goals and IT Security within an Organization. Tech. Columbia: Applied Network Solutions, n.d. Print. Gladwell, Malcolm. Blink: The Power of Thinking without Thinking. New York: Little, Brown and, 2005. Print. Goleman, Daniel, and Richard Boyatzis. "Social Intelligence and Biology of Leadership." Harvard Business Review (2008): n. pag. Web. Goleman, Daniel. Working with Emotional Intelligence. New York: Bantam, 1998. Print. Grimes, Roger. "Why You Don't Need a Firewall." InfoWorld. N.p., 15 May 2012. Web. 15 May 2012. <http://www.infoworld.com/d/security/why-you-dont-need-firewall193153?page=0,1>. Harris, Shon. CISSP Exam Guide. Berkeley, CA: Osborne, 2012. Print.
  • 90. References Con’t Krebs, Brian. "Krebs on Security." Krebs on Security RSS. N.p., 1 May 2012. Web. 16 Apr. 2013. <http://krebsonsecurity.com/2012/05/global-payments-breachwindow-expands/>. Krebs, Brian. "Krebs on Security." Krebs on Security RSS. N.p., 17 May 2012. Web. 16 Apr. 2013. <http://krebsonsecurity.com/2012/05/global-payments-breachnow-dates-back-to-jan-2011/>. Lee, Rob. "Blog." Is Anti-Virus Really Dead? A Real-World Simulation Created for Forensic Data Yields Surprising Results. SANS, 9 Apr. 2012. Web. 16 Apr. 2013. http://computer-forensics.sans.org/blog/2012/04/09/is-anti-virus-really-dead-areal-world-simulation-created-for-forensic-data-yields-surprising-results. "Open Security Architecture." Open Security Architecture. N.p., n.d. Web. 17 Apr. 2013. Plato, Andrew. "Analysis of the Palo Alto Cache Poison Issue." Anitian Blog. Antian Security, 3 Jan. 2013. Web. 16 Apr. 2013. "SABSA." SABSA. N.p., n.d. Web. 17 Apr. 2013.
  • 91. References Con’t Sherwood, John, Andrew Clark, and David Lynas. Enterprise Security Architecture: A Business-driven Approach. San Francisco: CMP, 2005. Print. Trustwave 2012 Global Security Report. Rep. Trustwave, 2012. Web. Verizon 2013 Data Breach Investigations Report. Rep. Verizon, 2013. Web. Wan, William, and Ellen Nakashima. "Report Ties Cyberattacks on U.S. Computers to Chinese Military." Washington Post. The Washington Post, 19 Feb. 2013. Web. 16 Apr. 2013. <http://www.washingtonpost.com/world/report-ties-100-plus-cyber-attacks-onus-computers-to-chinese-military/2013/02/19/2700228e-7a6a-11e2-9a75dab0201670da_story.html>. Zetter, Kim. "RSA Agrees to Replace Security Tokens After Admitting Compromise." Wired.com. Conde Nast Digital, 05 June 0011. Web. 16 Apr. 2013. <http://www.wired.com/threatlevel/2011/06/rsa-replaces-securid-tokens/>.

Notas do Editor

  1. Or , to make it simpler: Why, What, How.
  2. Break it down into three sections.
  3. Why do I need a three hour session on firewalls? If it were really that easy, we wouldn’t be here right? Anyone have any horror stories?
  4. Trustwave 2012 Global Security Report and Verizon Data Breach Report 2013
  5. His conclusion is simply that the attackers -- in this case, military intelligence agencies -- are simply better than commercial-grade anti-virus programs. Personally, I play a game. I’ll download a suspicious file without opening it onto various operating systems. Then I’ll wait to see how long it takes for each AV product to alert me that it’s got malware. Sometimes it’s a day, but often it’s a week.
  6. Trustwave 2012 Global Security Report
  7. Contributors to Verizon Data Breach Report: “The list of partners is not only lengthy, but also quite diverse, crossing international and public/private lines . It’s an interesting mix of law enforcement agencies, incident reporting/handling entities, a research institution, and other incident response (IR)/forensic service firms . What’s more, these organizations contributed a huge amount of data to the report . All told, we have the privilege of setting before you our analysis of more than 47,000 reported security incidents and 621 confirmed data breaches from the past year . Over the entire nine-year range of this study, that tally now exceeds 2,500 data breaches and 1 .1 billion compromised records . “ Australian Federal Police (AFP) www .afp .gov .au/policing/cybercrime CERT Insider Threat Center at the Carnegie Mellon University Software Engineering Institute (CERT) www .cert .org/insider_threat/index .html Consortium for Cybersecurity Action (CSIS control mapping) www .sans .org/critical-security-controls/ Danish Ministry of Defence, Center for Cybersecurity www .fmn .dk/Eng/Pages/Frontpage .aspx Danish National Police, NITES (National IT Investigation Section) www .politi .dk/en/servicemenu/home/ Deloitte www .deloitte .com Dutch Police: National High Tech Crime Unit (NHTCU) www .politie .nl Electricity Sector Information Sharing and Analysis Center (ES-ISAC) www .esisac .com/SitePages/Home .aspx European Cyber Crime Center (EC3) www .europol .europa .eu/ec3 G-C Partners, LLC www .g-cpartners .com/ Guardia Civil (Cybercrime Central Unit) www .gdt .guardiacivil .es Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) ics-cert .us-cert .gov/ics-cert/ Irish Reporting and Information Security Service (IRISS-CERT) Malaysia Computer Emergency Response Team (MyCERT), CyberSecurity Malaysia www .mycert .org .my/en/ National Cybersecurity and Communications Integration Center (NCCIC) www .us-cert .gov/nccic/ ThreatSim threatsim .com U .S . Computer Emergency Readiness Team (US-CERT) www .us-cert .gov/ U .S . Secret Service www .secretservice .gov Verizon www .verizonenterprise .com
  8. “WHILE IT MIGHT BE DIFFICULT TO DETECT, POSITIVELY IDENTIFY, AND RESPOND TO AN INTRUSION WITHIN SECONDS OR MINUTES, OUR ABILITY TO DO SO SHOULD OSTENSIBLY INCREASE THE LONGER THEY POKE AROUND OUR INTERNAL NETWORKS. BUT UNFORTUNATELY, WE’RE NOT REALLY SEEING THAT IMPROVEMENT.”
  9. http://www.theverge.com/2013/2/27/4035378/new-report-finds-hackers-stealing-terabyte-daily
  10. FUD= fear, uncertainty and doubt
  11. http://www.infoworld.com/print/193153 Why you don&apos;t need a firewall By Roger A. Grimes Created 2012-05-15 03:00AM Firewalls need to go away. I&apos;m just saying what we all already know. Firewalls have always been problematic, and today there is almost no reason to have one. Computer firewalls have been with us since the 1980s. Even early on it was pretty clear that they didn&apos;t really work; if they did, we would have defeated malicious hackers and malware a long time ago. But at least back in the day there was a decent reason to need them. [ The Web browser is your portal to the world -- as well as the conduit that lets in many security threats. InfoWorld&apos;s expert contributors show you how to secure your Web browsers in this &quot;Web Browser Security Deep Dive [1]&quot; PDF guide. | Keep up with key security issues with the Security Central newsletter [2]. ] A vestigial defenseFor nearly three decades, remote buffer overflows were the most dreaded tool in the hacker&apos;s arsenal. Simply find an open listening port running a vulnerable service, pile in executable code, and -- voila! -- your buffer overflow exploit gained you complete system access. That&apos;s hardly ever true anymore. The number of truly remote buffer overflows -- the ones you can point at a listening service and pull the trigger, such as SQL Slammer or MS-Blaster -- are dwindling and nearly gone. Ask Microsoft: Since the release of Microsoft Windows Server 2003 in April of that year, Microsoft Windows has had only a handful of truly remote buffer overflows. This is out of literally thousands of different versions of Microsoft services over nine years. (Note: Most of today&apos;s so-called remote buffer overflows require local human interaction to be successful, which does not qualify it as a remote exploit in my book.) It&apos;s simply harder to pull of any buffer overflow today, much less a remote buffer overflow. Microsoft and other vendors have significantly improved the quality of the code and provided excellent proactive memory protections, including DEP (data execution prevention), ASLR (address space layout randomization), canary stack values, and chip-level NX/XD hardware protections. Even if you pull off a buffer overflow against a service, fewer of them are running as local system or root. Worse than a boat anchorFirewalls tend to be horribly managed. Almost no one reads the logs or responds to the events recorded. Who can blame us? The average firewall produces thousands of warning messages every hour. Who can find the valuable, actionable information in all that noise? Not me -- nor any firewall administrator I&apos;ve ever met. Worse, when I review firewalls, almost all of them seem to have horrible rule sets. I find so many firewalls with &quot;ANY ANY&quot; rules that defang the protection, it doesn&apos;t faze me anymore. Again, I&apos;m not sure I can always blame the poor, misguided souls that have created those rules. Firewalls seem to interrupt many legitimate operations, and I know the frustration that led to those rules. I&apos;ve been there: &quot;Just open the firewall up and let&apos;s see if that&apos;s causing the problem. Oh, that worked. OK, we&apos;ll get that app running, then come back and fix the firewall later.&quot; I&apos;d be lying if I said this didn&apos;t happen once or twice in my career when I was a network administrator. These days, I have a hard time doing security reviews, patching, or other legitimate network management due to firewall problems. Plus, in over 20 years, I&apos;ve never reviewed a hardware firewall that had up-to-date firmware. They all contained public vulnerabilities that would allow attackers to get in only if they tried. It&apos;s ironic. The device that&apos;s supposed to protect the castle is a bridge across the moat. Familiar routesOne of the biggest reasons why firewalls don&apos;t matter is how every app and service being developed today works over either port 80 or 443, two ports you can&apos;t and never could block. The bad guys know this, and many years ago, they coded their hacking tools and malware to work over those same ports. If you find a malicious program that doesn&apos;t work over those two ports, I&apos;ll show you an old program or one that doesn&apos;t survive long in the wild. The smart hacker money has been sailing through the guaranteed open firewall ports for many years. Today, 99 percent of all successful attacks are client-side attacks, in which the end-user runs something he or she shouldn&apos;t -- and in those cases, the firewall doesn&apos;t help at all. But the real test of whether or not firewalls have any value is whether or not PCs with firewalls get hacked less than PCs with firewalls. This used to be true -- but it hasn&apos;t been true for a long time. Firewall farewellStill don&apos;t believe firewalls are going away? In truth, that process is already happening. We all know that most future computing devices will not be traditional desktop or laptop computers. Do you think that our pad devices, smartphones, mobile devices, and computer-enabled TVs are going to have firewalls -- or that their users that will understand firewalls well enough to configure them, especially when the firewall admin experts of our current networks can&apos;t do it? Please! In the future, which is now, firewalls are already dead. True, in a perfect world, firewalls would have real value. The recent Remote Desktop Protocol exploit [3] is a case in point: Microsoft recommended that affected clients block RDP port 3389 at perimeter firewalls as one of their protective work-arounds. But everyone I know, instead, installed the emergency patch. They didn&apos;t reconfigure the firewalls blocking port 3389. They did something else. This has been the case for every similar sort of exploit over the last decade. Heck, even when we block attacks at the firewall, the defense doesn&apos;t work. One of the most destructive worms in the past decade was MS-Blaster [4]. Initially, everyone relaxed because the port that MS-Blaster attack was blocked by nearly every perimeter firewall by default. A day later, every network in existence was infected by MS-Blaster. It turns out that perimeter firewalls have less value when you&apos;re riddled with infected mobile devices, VPNs, and other permeable holes laying open the false security that has always been granted by firewalls. The cost of having a firewall simply outweighs the benefits. Me? I&apos;ve known for a long time that firewalls were dead. It&apos;s just a matter of time until they disappear.
  12. Wouldn’t it be great if attackers set this bit out of courtesy for security engineers? Don’t they read RFCs? http://www.ietf.org/rfc/rfc3514.txt http://en.wikipedia.org/wiki/Evil_bit Wonder if someone has done this for IPv6?
  13. https://tools.ietf.org/html/rfc3093 Internet Transparency via the end-to-end architecture of the Internet has allowed vast innovation of new technologies and services [1]. However, recent developments in Firewall technology have altered this model and have been shown to inhibit innovation. We propose the Firewall Enhancement Protocol (FEP) to allow innovation, without violating the security model of a Firewall. With no cooperation from a firewall operator, the FEP allows ANY application to traverse a Firewall. Our methodology is to layer any application layer Transmission Control Protocol/User Datagram Protocol (TCP/UDP) packets over the HyperText Transfer Protocol (HTTP) protocol, since HTTP packets are typically able to transit Firewalls. This scheme does not violate the actual security usefulness of a Firewall, since Firewalls are designed to thwart attacks from the outside and to ignore threats from within. The use of FEP is compatible with the current Firewall security model because it requires cooperation from a host inside the Firewall. FEP allows the best of both worlds: the security of a firewall, and transparent tunneling through the firewall.
  14. So why have we come to believe that firewall technology will prevent an attack?
  15. I thought security was supposed to be like an onion, not a sandwich. Do you feel protected by your BLT? Which one looks more appetizing?
  16. Anyone notice anything? The two do *not* align. They’re also fairly generic, without any consideration of the specifics to a business.
  17. Anyone else notice that these two don’t seem to overlap? How do you map one to the other?
  18. Who is the data owner?
  19. These are two entirely different things, no? Maybe a quikmeme from Blue Velvet?
  20. Pick your battles.
  21. The catalog you provide to your customer is a Business catalog. Once a customer orders something, you, as a service provider must fulfill that request. You have a catalog of services needed to fulfill orders, this becomes your Technical catalog. Your customer may not need to know exactly how you fulfill their order, just that they get it delivered fast and efficiently. ITIL defines two different aspects of an organization&apos;s service catalog, which in practice can be two separate initiatives: Business Service Catalog ~ Defines services delivered to all end users within an organization, e.g. ordering a new laptop. Technical Service Catalog ~ Audience is generally internal IT staff and IT management. Defines the IT components necessary to support the provisioning of services to end users, e.g. hosting, network backup, security, etc. These services should not be included in the business user view. Today, it is accepted that the Business Service Catalog should be an online web store that all users visit to order any IT service. The Technical Service Catalog should be integrated with your CMDB and should be viewed by internal IT staff and management. Business users don&apos;t need to see all this underlying detail. The Business Service Catalog contains services that customers need and use as seen from their perspective. It should not be confused with a configuration management database (CMDB), though they should integrate. A view of the CMDB may constitute a Technical Service Catalog.
  22. The design artifacts that describe how the security controls (= security countermeasures) are positioned, and how they relate to the overall IT Architecture. These controls serve the purpose to maintain the system’s quality attributes, among them confidentiality, integrity, availability, accountability and assurance.
  23. Template courtesy OSA. You’ll notice that the design is driven by PRINCIPLES, not solutions.
  24. http://en.wikipedia.org/wiki/Form_follows_function The American architect, Louis Sullivan, Greenough&apos;s much younger compatriot, who admired rationalist thinkers like Greenough, Thoreau, Emerson, Whitman and Melville, coined the phrase in his article The Tall Office Building Artistically Considered in 1896 (some fifty years after Greenough&apos;s death). Here Sullivan actually said &quot;form ever follows function&quot;, but the simpler (and less emphatic) phrase is the one usually remembered. For Sullivan this was distilled wisdom, an aesthetic credo, the single &quot;rule that shall permit of no exception&quot;. The full quote is thus: &quot;It is the pervading law of all things organic and inorganic, of all things physical and metaphysical, of all things human and all things superhuman, of all true manifestations of the head, of the heart, of the soul, that the life is recognizable in its expression, that form ever follows function. This is the law.&quot;[2]
  25. Eric M. Hutchins, Michael J. Cloppert, Rohan M. Amin, Ph.D of Lockheed Martin in their paper, “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” The phrase “kill chain” describes the structure of the intrusion, and the corresponding model guides analysis to inform actionable security intelligence.