Transcript invited
Information Technology Security:
Fitting Into the Big Picture
Brandon Hoffman, KPMG LLP
Topics for Discussion
Typical IT Security Technical Work
Intrusion Detection/Prevention
Ethical Hacking/Penetration Testing
IT Security in the Business
Risk, Audit Support, Compliance
Policies, Standards, and Procedures
IT Security’s Role in Creation and
Enforcement
Intrusion Detection
Intrusion Detection Systems are just what they
seem to be.
Detect and Alert
How they work?
Host Based and Network Based
Statistical Modeling
Heuristics
Trending
End result? Similar to home security system
Intrusion Prevention Systems
Actively participates in defense of
security violations
Host based IPS:
Resident to the host machine. Monitors
system calls and inbound traffic. Creates a
baseline and can prevent internal “bad”
behavior through system controls.
Typically
works in conjunction with Anti-virus
Sandboxing – Creates isolated “scratch” disk
space to run untrusted platforms or
applications from untrusted third parties
Intrusion Prevention cont’d
Network based IPS has several
operating modes or implementations:
Inline IPS is directly inline with the data
stream similar to a firewall
Gateway Interaction performs packet
analysis interactively with the
router/firewall
Intrusion Prevention cont’d
Network intrusion prevention action
methods:
Content based – Inspects packet contents
for unique sequences or “signatures” to
prevent known attacks
Protocol analysis – Decodes known
protocols to detect anomalous behavior
Rate based – Used to prevent Denial of
Service attacks
Intrusion Prevention cont’d
Core Design:
www.pandasecurity.com
IPS Business Case 1
Company X requires a homogeneous solution due to compliance
and governance restrictions. The facts:
Cisco is the network hardware provider for all communications.
All connections need to be monitored:
VOIP
Hosts
Gateways
VPN
Routers and Switches
Ingress/Egress traffic (Firewall)
The aggregation point for analysis and statistics must be built
on a windows server platform
The solution must be licensed
The solution should not be built on open source code
Support from the vendor must be highly available regardless of
cost
IPS Business Case 1 cont’d
How do you choose?
© 2008 Gartner, Inc. and/or
its Affiliates. All Rights
Reserved.
IPS Business Case 1 cont’d
Cisco Solutions
Sourcefire Solutions
Points to consider:
Points to consider:
Homogeneous solution Homogeneous solution
Proprietary Code Base
Visionary Leader
Controls SNORT signature
Supreme Support
engine
Current Vendor
Cost
Management easy but
Potentially lacking support
not intuitive
New vendor
Fewer vulnerability
Technically complicated
signatures
Open Source based
Cost
IPS Business Case 1 cont’d
Cisco wins based on the scorecard of requirements.
© 2007 Cisco Systems, Inc.
All rights reserved.
IPS Business Case 1 cont’d
Protection At All Layers
© 2007 Cisco Systems, Inc.
All rights reserved.
Ethical Hacking
Ethical hacking is a very common
profession within the IT security
industry.
White hat, Grey hat, Black hat
Sometimes synonymous with
penetration testing – A method of
assessing the security posture of a
system or network by simulating an
“attack”
Ethical Hacking cont’d
Most current computer protocols were designed
in a time when security was not a
consideration. Times have changed:
Source: CERT
Ethical Hacking cont’d
Why perform an ethical hack?
Determine flaws and vulnerabilities
Provide a quantitative metric for
evaluating systems and networks
Measure against pre-established
baselines
Determine risk to the organization
Design mitigating controls
Ethical Hacking cont’d
Ethical Hacking cont’d
Ethical Hacking cont’d
Ethical Hacking cont’d
We will now explore some free tools and simple techniques to break into
a machine.
Disclaimer:
Don’t Try This At Home
Statute 1030, Fraud and Related Activity in Connection with
Computers, specifically states that whoever intentionally
accesses a protected computer without authorization, and as a
result of such conduct, recklessly causes damage or impairs
medical treatment, can receive a fine or imprisonment of five to
20 years. http://www.usdoj.gov/criminal/cybercrime/1030NEW.htm
Cyber Security Enhancement Act 2002 implicates life sentences
for hackers who 'recklessly' endanger the lives of others, and
several U.S. statutes address cyber crime.
http://www.usdoj.gov/criminal/cybercrime/homeland_CSEA.htm
Wanna Break In?
The first step in any ethical hack is to
obtain information in the most stealth
fashion.
USE NMAP!!
NMAP
nmap is an open-source port/security
scanner
http://insecure.org/
It’s primary function is the discovery
and mapping of hosts on a network
nmap is consistently voted as one of
the most used security tools
NMAP
Host Discovery – Identifying computers on a
network
Port Scanning – Enumerating the open ports
on one or more target computers
Version Detection – Interrogating listening
network services
listening on remote computers to determine the
application name and version number
OS Detection – Remotely determining the
operating system from network devices
NMAP
Sample Syntax:
nmap [ <Scan Type> ...] [ <Options> ] { <target specification> }
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc.
Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0255.1-254
-iL <inputfilename>: Input from list of hosts/networks
-iR <num hosts>: Choose random targets
--exclude <host1[,host2][,host3],...>: Exclude hosts/networks
--excludefile <exclude_file>: Exclude list from file
NMAP cont’d
Analyze your results:
Vulnerabilities
Find any hosts worthwhile? Your next
step should be scanning for exploitable
vulnerabilities.
USE NESSUS!!!
© Copyright 2002 - 2009 Tenable Network Security(R).
All Rights Reserved.
Nessus
Nessus is an open-source vulnerability scanner
Public domain software, such as Nessus, isn't
always inferior and sometimes it is actually
superior !
Technical support available at
tenablesecurity.com
Three steps
1. Run a port-scan (using nmap) on the target host
to determine which ports are open
2. Once open ports are identified, Nessus runs a set
of exploits on the open ports. Nessus assumes
standard processes run on standard ports (i.e.,
http on port 80)
3. Check for and reporting vulnerabilities
Nessus
Vulnerability checks are implemented
through plugins.
Plugins are written in Nessus Attack Scripting
Language (NASL), a scripting language optimized
for custom network interaction.
New plugins are added as vulnerabilities are
discovered.
Many plugins check for a vulnerability by
actually exploiting the vulnerability.
The ‘safe checks’ option specifies that no
vulnerability check capable of crashing a
remote host be used (such as DOS attacks).
Nessus
Check your results!!
How Do We Exploit?
Now that you have found a useful
exploit, what do we use?
USE METASPLOIT!!!
Copyright © 2003-2009 Metasploit LLC
Metasploit ™ is a registered trademark
Contact us at msfdev[at]metasploit.com
MetaSploit
Metasploit was created in 2003 as a portable
network game using the Perl scripting
language. Later, the Metasploit Framework
was then completely rewritten in the Ruby
programming language. It is most notable
for releasing some of the most technically
sophisticated exploits to public security
vulnerabilities. In addition it is a powerful
tool for third party security researchers to
investigate potential vulnerabilities.
MetaSploit cont’d
Remember the machine with vulns?? Let’s use the metasploit framework….
MetaSploit cont’d
What else can we do now that were in???
MetaSploit cont’d
We can add shares as root!!
Ethical Hacking cont’d
Administrative items:
Authorization letter – “Get out of jail
free card”
Risk report
Likelihood of risk
Mitigation plans
Trends (performed with recurring clients)
Ethical Hacking cont’d
Quantitative Heat Map Guide
Vertical Axis = Likelihood of risk being realized
Horizontal Axis = Impact if risk were realized
Size of Bubble = Relative total instances of that issue
= Low Risk
= High Risk
= Moderate Risk
= Critical Risk
Almost
Certain
Likelihood of Occurrence
B
C
Likely
D
E
F
J
Moderate
K
H
L
O
I
N
Unlikely
A
G
M
P
Q
Rare
R
Low
Moderate
to Low
Moderate
Magnitude of Impact
Moderate
to High
High
Q&A
ANY QUESTIONS?
The CISO Agenda
Business
Managing 3rd Party Risk (Outsourcers)
Culture / Awareness
M&A
Strategy
High Availability
Technology
Enablement
Executive / Board Reporting
Metrics / Benchmarking
Privacy / Security Breach
Business Continuity
Brand Protection & Enhancement
Alignment with Business Goals / Objectives
Disaster Recovery
CISO
Identity Management
Mobile Computing
Linkage to Enterprise
Risk Mgmt
Regulatory
Compliance
Compliance / Internal Audit
Evolving Threats
Vulnerability / Patch Management
Staffing Support
Core Functions
Risk
IT Security performs a critical role in
assessing risk in the organization.
Vulnerability Scanning
Penetration Testing
Industry Trends
IT Strategy
Familiarity with Audit and Compliance
measures
Audit Support
In many cases, IT Security is heavily
relied upon to perform in depth testing
required by an audit organization.
Security is enlisted by audit because:
Technical expertise
Familiarity with current issues from
internal testing
Familiarity with Policies, Standards, and
Procedures
Compliance
Compliance may relate to internal
compliance or external compliance.
Internal compliance:
Policies and Standards
Security and Configuration baselines
Framework use – ISO, COBIT, ITIL,
GAISP, NIST
Best Practices
Compliance cont’d
External compliance:
SOX (Sarbanes Oxley)
COSO Framework
HIPAA
PCI
Safe Harbor
ISO Best Practices
Source: www.rsa.com
Compliance in Action
Source: www.rsa.com
Internal Policy
IT Security is regularly tasked with
creation and enforcement of IT
policies, standards, and procedures.
Creation and enforcement of these
documents require:
Understanding of audit roles and procedures
Familiarity with all systems, networks, and
applications
Compliance considerations
Internal Policy cont’d
Definitions:
A Policy is a set of directional statements and requirements
aiming to protect corporate values, assets and intelligence.
Policies serve as the foundation for related standards,
procedures and guidelines.
A Standard is a set of practices and benchmarks employed
to comply with the requirements set forth in policies. A
standard should always be a derivation of a policy, as it is the
second step in the process of a company’s policy propagation.
A Procedure is a set of step-by-step instructions for
implementing policy requirements and executing standard
practices.
Internal Policy cont’d
Internal Policy cont’d
Policy creation and enforcement cycle
Policy Business Case
A top 5 global food retailer has a massive
IT/IS infrastructure and good
governance….but no real policies!
Policies are the foundation for enforcing
IT compliance and governance.
What policies were written for the client…
Policy Business Case cont’d
Policies written for IT Security:
Acceptable Use Policy
Information Classification & Ownership Policy
Risk Assessment & Mitigation Policy
Access Control Policy
Network Configuration and Communication Policy
Remote Access Policy
Business Continuity Policy
Incident Response Policy
Third Party Data Sharing Policy
System Implementation & Maintenance
Secure Application Development
Cryptography & Key Management
Mobile Computing
Physical & Environmental Security
Policy Business Case cont’d
Sample Policies
Q&A
Any Questions?
Contact Information
Brandon Hoffman
[email protected]
312.665.2775