SlideShare a Scribd company logo
1 of 24
Download to read offline
Fiveimperatives
foradvanced
cybersecurity
What it takes to detect
and respond to advanced
cyber threats
CYBER SECURITY INSIDER – EBOOK 3/3
2CYBER SECURITY INSIDER – EBOOK 3/3
Advancing
thestate
ofyour
cyber
security
3CYBER SECURITY INSIDER – EBOOK 3/3
Advancing
thestateofyour
cybersecurity
In the simplest possible terms, advanced cyber
security is about stopping most breaches from
happening, rapidly detecting the ones that do
happen and then moving as quickly as possible
to minimize their impact.
It’s a far cry from the primarily defensive
approach to cyber security that most
companies are used to and set up for.
Instead, it’s a proactive and dynamic discipline
that’s constantly evolving – just like the
infrastructure you’re protecting and the
threat landscape you’re protecting it from.
Getting this right comes down to two things:
increasing the relevance of the information
available to your team and reducing the
amount of time spent between breach,
detection and remediation.
In this eBook we’ll be taking you through what
we’ve found to be the five most important
measures for advanced cyber security:
1. Collecting and managing forensic evidence
2. Using analytics to detect anomalies
3. Cutting through the noise with human
expertise
4. Learning from threat intelligence
5. Creating (and rehearsing) incident
response plans
We’ll explain why these measures are so crucial
and how to implement them in the real world.
Let’s start.
Catch up on the rest of the
Cyber Security Insider series
In case you missed them, check out the
last two eBooks from this series.
In the first eBook, ‘The Chaos of a
Corporate Attack’, we looked at how
one company was breached and what
the impact of the breach was.
In the second, ‘How CISOs deal with
advanced cyber threats’, we looked at the
steps (both good and bad) European CISOs
were taking to protect their companies.
4CYBER SECURITY INSIDER – EBOOK 3/3
Collecting
andmanaging
forensic
evidence
5CYBER SECURITY INSIDER – EBOOK 3/3
When a breach is detected, the first step is a
forensic investigation to figure out what the
attacker did, what systems he had access to,
how he got in, and how long he spent in the
network. That takes evidence.
The better the evidence, the easier and
quicker the investigation goes. More
important, it’s only once you’ve collected
accurate forensic information that you can
start to formulate an appropriate cleanup plan.
So evidence is key. But having the right
evidence means having access to a long-term
history of relevant events collected from
endpoints, servers, and the network. And that
can be challenging for a couple of reasons:
There’s no definitive list of what evidence to
collect. That’s because the type of events
you’ll want to collect and store will depend
largely on your infrastructure and the type
of attacks you expect to be hit with.
At the same time, you can’t possibly log
everything either. Network bandwidth,
application performance, storage constraints
and the sheer complexity of processing
huge volumes of data make ‘store it all’
an untenable strategy.
So you need to pick your sources wisely.
LIVING OFF THE LAND
Most companies fail to detect breaches
quickly enough. In fact, in most of the cases
we’ve worked on, the intruders that gained
access to the corporate network remained
undetected for months before finally being
hunted down.
Collecting
andmanaging
forensicevidence
6CYBER SECURITY INSIDER – EBOOK 3/3
Some sources of information – like system
logs, web logs, and firewall logs –are obvious
choices for collection. But when it comes to
picking which other events you should track,
it helps to create a feedback loop.
In this process, your security experts perform
an analysis of the situation, use that analysis to
determine what data to collect, and then use
that data to perform a subsequent analysis of
the same situation.
This cyclical approach, which we recommend
repeating on a regular basis, will allow your
security experts to evaluate their coverage,
check that they’re gaining visibility into all
levels of your infrastructure and see if they’re
collecting data relevant to the types of attacks
you should expect. We’ve found it takes two
full-time experts to run this process properly.
A process for picking
the right sources
Collecting
andmanaging
forensicevidence
7CYBER SECURITY INSIDER – EBOOK 3/3
Best practices for smarter
data collection
Most of the choices you make around evidence
collection will need to be specific to your
company and infrastructure. But there are
some pieces of advice around data collection
that are broadly applicable.
- Log outbound connections. It’s surprising
how many companies only log incoming
connections. Outgoing connections can
provide clues about command and control
server connections and data exfiltration
activities, as well as potential insider threats.
Of course, your ability to do this may be
constrained by the volume and type of
network traffic your organization experiences.
Bonus tip: remember to log IP addresses and
not just reverse-DNS names.
- Collect access logs. This should include
detailed logs from domain controllers
and other authentication servers.
These are extremely useful for forensic
investigative work.
- Look out for Network Address Translations
(NAT) routers. If you aren’t aware of any NATs
inside your organization, you may find that
some of your system logs show all inbound
traffic originating from a single IP address.
As you’d imagine, this makes forensic
investigations a lot harder.
- Log data during incidents. If you notice (or
suspect) an attack is underway and your
logging is broken or inadequate, all is not
lost. Just fix the problem immediately. This
is actually a great time to turn the dial up
on what you’re collecting and logging. The
more data you can collect during an incident,
the better. Once you’re in the clear, you can
always scale your data collection back down.
- Perform regular drills. Not only will you need
to do this to check you’re logging everything
you need to, it’ll also ensure you know where
to find all the data you’ve been collecting
when something goes wrong.
- Keep up with the threat landscape. Learn what
attackers are doing. And make sure the data
you’re collecting is relevant to the type of
attacks you’re expecting to see
Collecting
andmanaging
forensicevidence
8CYBER SECURITY INSIDER – EBOOK 3/3
Protecting your evidence
Intruders will invariably try to cover their
tracks. Often, this will mean tampering
with the evidence you need to run a forensic
investigation. So once you start collecting the
right evidence, aim for a safe, tamper-proof
evidence storage strategy and an adequate
retention policy.
Collecting logs in a centralized storage
platform, such as a Security Incident and
Event Management system (SIEM), is a
smart way to protect against tampering.
But whatever central location you choose to
use, what’s important is that you collect and
store logs from hosts and devices across your
network. And that you then retain those logs
for a long enough period of time to ensure
you have access to a copy of that data, should
you need it for forensic evidence.
We recommend the following practices:
- Aim for a data retention policy of at least
two years.
- Make sure you’re synchronizing the
time across all machines on your network
(via NTP). And if your organization’s spread
across multiple geographic locations, make
sure you’re aware of time zone differences.
- Ensure your data storage has proper
access controls surrounding it to reduce
the chances of tampering.
- Make sure you have a solid, working
backup policy in place for all collected
and stored data.
Collecting
andmanaging
forensicevidence
9CYBER SECURITY INSIDER – EBOOK 3/3
Usinganalytics
todetect
anomalies
10CYBER SECURITY INSIDER – EBOOK 3/3
Once you’ve defined a set of events and data
worth collecting (and built the infrastructure
to aggregate it), you can start the process of
hunting for anomalies, signs of intrusion and
suspicious behavior.
Ideally, you’ll want to process incoming data
on-the-fly. But you’ll also want to process
historical data against new Indicators of
Compromise (IoCs) and rule-sets as dictated
by changes in threat intelligence.
It’s smarter to process large volumes of data
like these with statistical analytics, rather than
going line-by-line. So you’ll need automation
and big data analytics to perform these sorts
of analyses well.
We’ve found that using freely available engines
(such as Graylog and ELK Stack) makes this
process far easier than attempting to build
your own technology stack.
Usinganalytics
todetect
anomalies
Threat intelligence
Threat intelligence is a loosely defined term
used to represent all sorts of information
ranging from high-level political and
strategic advice to streams of technical
data designed for machines to process.
For the purposes of this eBook, when
we talk about threat intelligence, we’re
referring to knowledge of the threat
landscape and the tactics, techniques and
procedures (TTPs) used by attackers, as
well as low-level technical data such as IoCs.
11CYBER SECURITY INSIDER – EBOOK 3/3
When it comes to seeking out anomalies
and malicious behavior, we’d recommend
starting here:
Correlate collected data against threat
intelligence feeds. Obvious feeds to start with
include known-malicious IP addresses, domains,
and file hashes.
Look for anomalous access management log
patterns. Examples might include a single
non-admin user attempting to log into multiple
servers, or one machine attempting to log into
a server under multiple different accounts.
Look for activity that might point to an intruder
using brute force methods. This might include
hundreds of thousands of login attempts in a
suspiciously small time frame.
Seek out patterns of unusual user behavior.
An example of this would be an SSH connection
originating from a non-technical user’s machine.
Flag activity that appears to happen at odd
times. Such as in the middle of the night, on
weekends, or during public holidays.
Look for signs of tunnelling software.
A commonly used example is called Teredo.
The advice listed above is just a subset of all the
possible ways to detect anomalies. But we’ve
found these methods are particularly useful in
the current threat landscape.
Of course, over time, you should continue to
tune your own analytics models for the sorts of
threats you expect to face based on a deeper
understanding of the tactics, techniques and
procedures (TTPs) used by attackers.
Usinganalytics
todetect
anomalies
12CYBER SECURITY INSIDER – EBOOK 3/3
Cuttingthrough
thenoisewith
humanexpertise
13CYBER SECURITY INSIDER – EBOOK 3/3
There are some incredibly sophisticated
analytic methods for detecting anomalies.
But they are by no means a viable replacement
for real human intuition. Because no matter
how well configured your analytics tools are,
they will produce noise – false positives and
unnecessary alerts.
Configure the rules to be too aggressive and
a real incident might end up buried in noise.
Configure the rules to be too relaxed and your
tools might not flag suspicious activity at all.
So effective cyber security depends
on the use of both analytics and human
security experts.
This is perhaps the most important fact of
advanced cyber security. Because there’s
a whole range of potential attacks on your
infrastructure. And no automated tool can
be prepared to tackle all of them without
human expertise and intuition to guide
your security strategy.
Cuttingthrough
thenoisewith
humanexpertise
On one end of the spectrum, there are
uncoordinated attacks by cyber criminals that
threaten your end-users with ransomware,
bots and other crime ware and poison your
externally facing web servers with exploit kits.
These aren’t the most sophisticated attacks.
But they can leave your organization exposed.
For instance, it’s not uncommon for more
organized attackers to purchase access
to compromised machines on corporate
networks from other criminal organizations.
It’s an easy and cheap way in.
On the other end of the spectrum, you’re also
susceptible to advanced threat actors who’ll
target and access your internal network.
These attacks can be as well planned as a
military campaign. And you need experts who
understand the details of how these attacks
work to detect them.
In these cases, attackers usually get in through
vulnerable software, SQL injection attacks or
‘social engineering’ tricks that get users to run
a Trojan on a corporate machine.
The broad spectrum of
advanced cyber threats
14CYBER SECURITY INSIDER – EBOOK 3/3
Once they’re in, they
have a number of ways
to get data out
Advanced exfiltration techniques
include wrapping data in encrypted
packets or password-protected zip files,
using social media or webmail sites for
uploads, or even use steganography
(the practice of concealing secretive
data in non-secretive text or image files)
or peer-to-peer file transfer.
Once in, these intruders can map out your
network and systems in search of data or
opportunities for lateral movement, while
laying low for weeks. They’ll even install
rootkits, destroy evidence of their presence,
steal accounts and start to harvest your data.
From there they can exfiltrate data using
techniques that are hard to detect because
they mimic normal user behavior.
The point of all this isn’t to spook you. It’s to
explain the practical reality that sophisticated
attackers know how to evade common
detection methods. So it takes a combination
of well-configured analytics tools and the keen,
trained eyes of human experts to catch them.
Cuttingthrough
thenoisewith
humanexpertise
15CYBER SECURITY INSIDER – EBOOK 3/3
Learning
from
threat
intelligence
16CYBER SECURITY INSIDER – EBOOK 3/3
As we mentioned earlier, ‘threat intelligence’
is a pretty broad term that can be used to
describe everything from strategic political
advice to more tactical information on IoCs
that’s designed for machines.
TECHNICAL THREAT INTELLIGENCE
You can buy technical threat intelligence
feeds from a variety of third parties. These are
ideally used as inputs to correlation rules in
SIEM systems or other event analysis systems.
Technical threat intelligence feeds often have
short lifetimes so you need to keep refreshing
them and running them against collected data
in order to make sure they’re still valid.
You can use these feeds in a variety of ways.
For instance, a feed containing a list of
malicious IP addresses can be parsed and
used to automatically configure firewall
or Intrusion Detection System (IDS) rules.
Experts can, and often do, combine multiple
technical threat intelligence feeds to create
new types of intelligence that can be applied
to your collected data.
Learningfrom
threatintelligence
Given the number and scope of technical
threat intelligence feeds available, it makes
sense to carefully select data that’s relevant
to your organization’s specific needs. This
is where tactical threat intelligence comes
into play.
17CYBER SECURITY INSIDER – EBOOK 3/3
Tactical threat intelligence
Tactical threat intelligence educates your
security experts about the threat landscape.
This sort of intelligence can be gleaned from
a number of different sources like news feeds,
social media, RSS feeds, chat forums and
mailing lists.
These kinds of sources are great because
they ensure your experts regularly gain
knowledge and experience that can then be
used to create rules, automation, and analytics
models to detect potential threats. In fact, it
actually helps them pick which technical threat
intelligence feeds to source.
Tactical threat intelligence provides important
context. It describes the ‘who’, ‘why’ and ‘how’
you need to understand and properly prepare
against modern threats.
Understanding your attackers
At the end of the day, you can only derive
actionable threat intelligence from a deep
understanding of how attackers operate.
Good attackers understand the defenses they’re
going to face. They’re stealthy, they know how
to evade common detection methods and
they understand how companies operate.
Soifyou’regoingtomountasoliddefense,you
andyourteamneedtoknow asmuch about
them,theirmethodsandtheirmotivesasyoucan.
One way to look at threat intelligence is as a
series of feeds you can buy and plug into your
THINKING LIKE AN ATTACKER
To really get under the skin of the kind of
people who attack corporate networks,
it helps to know some of those people
(or at least know people who know
them). It’s why we work so closely with
people who’ve been on the other side.
SIEM. But used well, they’re a whole lot more.
They’re tools for education. It’s about gaining
the mindset and skillset of an attacker and using
that knowledge to counter them.
Learningfrom
threatintelligence
18CYBER SECURITY INSIDER – EBOOK 3/3
Creating
(andrehearsing)
incident
responseplans
19CYBER SECURITY INSIDER – EBOOK 3/3
By doing this, you’ll gain insight into what they
did, how they did it and why, while also being
better placed to catch them in a way that
blocks them completely.
Wementionthisbecausewithout aclear and
coherent incident responseplan,thechaosof
themoment dictateshoweveryonereacts.
That’saproblemat thebest oftimesand
potentiallydisastrousinthemiddleofanincident.
Incident response plans are one of those things
you never want to use. But when the time
comes to use them, you’ll really wish you had
one. So here are some pieces of advice on what
it takes to get incident response plans right.
Creating
(andrehearsing)
incident
responseplans
In almost all cases, when a company realizes
they’ve been breached, the responding team’s
instinct is to quickly block the attacker. That
might mean taking a machine offline, closing
down an account or adding a firewall rule.
But while these quick fix, knee-jerk reactions
sound good at the time, all they end up doing
is alerting the intruder to the fact that you’re
onto them. Invariably, the attacker stops what
they’re doing, lays low until things calm down
– and then gets back to work.
A better approach is to observe the intruder,
and carefully investigate the situation as
thoroughly as possible without alerting them.
20CYBER SECURITY INSIDER – EBOOK 3/3
when they’re run through. Record the amount
of time it would take you to recover from the
scenario. And adjust your plans depending on
the results. We’d also highly recommend testing
your plans with real attacks.
Prepare communications channels. Know who
you need to notify about what, and when if
something went wrong. Prepare a list of contacts
and make sure it’s kept up-to-date. Think about
what you might need to tell your customers. In
the chaos of a real incident, you’ll have very little
time to communicate detailed, well-groomed
statements. So decide on the minimum
communications needed and then plan for them.
Plan for the most relevant attack scenarios.
By studying the threat landscape and reading
about incidents other companies have faced,
you should be able to assemble hypothetical
attack plots that can then shape your incident
response plans.
Define and train an incident response team.
Make sure you know who’s meant to do what,
identify how communication channels should
work and identify any secondary resources
you might need for things like forensic
investigation.
Practice your plans. Simulate different incidents
on your scenario list. Make sure your plans work
Prepare “emergency first aid” guidelines for
admins and staff. And then test them on those
guidelines periodically. Train your response team
on how to dive into forensics once they hit the
scene. Train your whole staff to be aware of
attack vectors relevant to their positions.
Make sure you have centralized logging set
up. Make sure it works. Test it to make sure it’s
recording the amount and types of information
you’ll need for an investigation later.
Don’t pull the power plug on any device you
think is compromised. You’re going to want to
get memory forensics from affected devices
so keep them going.
Train your staff to disconnect the network from
compromised devices. This includes disabling
Wi-Fi, Bluetooth, and mobile broadband
connections.
Secure the logs from a compromised machine.
Ideally, your centralized logging mechanisms
should be doing this anyway. But it helps to
train certain staff about how best to respond to
a potentially compromised machine. Make sure
they preserve logs from surrounding systems
such as firewalls and active directory. This will
help you verify how widespread the breach is.
Creating
(andrehearsing)
incident
responseplans
21CYBER SECURITY INSIDER – EBOOK 3/3
Don’t trust anything on the compromised
machine. Common tools are often “trojanized”
and may give false readings.
Make sure your network diagrams are
readily available and up-to-date. This
speeds up response rates a whole lot
more than you’d think.
Reset passwords and authentication.
If you suspect that user passwords or other
authentication factors were used in the attack,
or if things like password hashes have been
leaked, reset the passwords of affected users.
Figure out the root cause before you re-create
breached systems. When the incident is
over, you might be tempted to just re-create
breached systems from backup. But without a
clear understanding of the root cause, it’s very
likely that the attack vector will still exist and
the machines might soon be compromised
again. So it’s crucial you understand the root
cause, mitigate against it and then get the
system back online.
Incident response is an essential aspect of
modern crisis and risk management. And the
best plans come with C-level buy-in.
This might sound like the kind of thing executives
would roll their eyes at. But the reputational and
professional implications of dealing with a breach
have meant the smartest companies just want to
get this kind of thing right.
If you’re still reading this eBook, you’re likely
working for one of them.
The resources needed
to respond
For most organizations, it’d take a
team of about ten trained experts to
launch an appropriate investigation into
an incident.
Since it doesn’t make sense to staff that
many experts for every organization,
it helps to know where you can find
the external experts needed to handle
incident escalations.
Creating
(andrehearsing)
incident
responseplans
22CYBER SECURITY INSIDER – EBOOK 3/3
Tackling
advanced
threats
headon
23CYBER SECURITY INSIDER – EBOOK 3/3
The attackers and tools your corporate
infrastructure’s up against have never been
more sophisticated. So detecting them,
responding to them and investigating them
takes a deep understanding of how they work.
Of course, this is further complicated by
the fact that attackers know how to evade
prevention and detection measures and have
their own in-depth knowledge of companies
and their tactics. Which is why modern
cyber security can’t rely on static, defensive
measures only.
Tackling
advanced
threats
headon
It takes the combination of human expertise,
analytics, and a constantly growing pool of
relevant data and threat intelligence to get
this right.
The good news is that the information,
technology and skill needed to detect anomalies
and react to them rapidly already exist.
So we hope you follow the tips and advice
we’ve shared in this eBook. And crucially, we
hope you won’t stop learning about how to
improve your approach to cyber security.
It’s just too important to ignore.
24CYBER SECURITY INSIDER – EBOOK 3/3
And we’ve been a part of the security industry
for over 25 years. It’s why we’ve become a
trusted advisor to both industries and EU law
enforcement agencies across Europe.
In fact, we’ve been involved in more European
crime scene investigations than any other
company on the market.
Our Cyber Security Services help companies
react faster, learn more and respond more
intelligently to threats and breaches of all
sizes. So if you’re one of the smart ones and
you’re getting serious about cyber security,
we should talk.
thE CYBER SECURITY
INSIDER series
Read ‘The Chaos of a Corporate Attack’
to find out how one company was
breached and how it impacted them.
Read ‘How CISOs deal with advanced
cyber threats’ to find out what European
CISOs are doing to protect their
companies (and what they shouldn’t
be doing).
We’re
f-secure

More Related Content

Viewers also liked

Multi-container Applications on OpenShift with Ansible Service Broker
Multi-container Applications on OpenShift with Ansible Service BrokerMulti-container Applications on OpenShift with Ansible Service Broker
Multi-container Applications on OpenShift with Ansible Service BrokerAmazon Web Services
 
Docker swarm-mike-goelzer-mv-meetup-45min-workshop 02242016 (1)
Docker swarm-mike-goelzer-mv-meetup-45min-workshop 02242016 (1)Docker swarm-mike-goelzer-mv-meetup-45min-workshop 02242016 (1)
Docker swarm-mike-goelzer-mv-meetup-45min-workshop 02242016 (1)Michelle Antebi
 
Sprint 49 review
Sprint 49 reviewSprint 49 review
Sprint 49 reviewManageIQ
 
How to Scale Your Architecture and DevOps Practices for Big Data Applications
How to Scale Your Architecture and DevOps Practices for Big Data ApplicationsHow to Scale Your Architecture and DevOps Practices for Big Data Applications
How to Scale Your Architecture and DevOps Practices for Big Data ApplicationsAmazon Web Services
 
Get complete visibility into containers based application environment
Get complete visibility into containers based application environmentGet complete visibility into containers based application environment
Get complete visibility into containers based application environmentAppDynamics
 
Raleigh DevDay 2017: Deep Dive on AWS Management Tools
Raleigh DevDay 2017: Deep Dive on AWS Management ToolsRaleigh DevDay 2017: Deep Dive on AWS Management Tools
Raleigh DevDay 2017: Deep Dive on AWS Management ToolsAmazon Web Services
 
Retelling nonfiction
Retelling nonfictionRetelling nonfiction
Retelling nonfictionEmily Kissner
 
Monitoring and tuning your chef server - chef conf talk
Monitoring and tuning your chef server - chef conf talk Monitoring and tuning your chef server - chef conf talk
Monitoring and tuning your chef server - chef conf talk Andrew DuFour
 
IoT and Big Data
IoT and Big DataIoT and Big Data
IoT and Big Datasabnees
 
Evolutions et nouveaux outils SEO
Evolutions et nouveaux outils SEOEvolutions et nouveaux outils SEO
Evolutions et nouveaux outils SEODimitri Brunel
 
Reversing Engineering a Web Application - For fun, behavior and detection
Reversing Engineering a Web Application - For fun, behavior and detectionReversing Engineering a Web Application - For fun, behavior and detection
Reversing Engineering a Web Application - For fun, behavior and detectionRodrigo Montoro
 
Do we need a bigger dev data culture
Do we need a bigger dev data cultureDo we need a bigger dev data culture
Do we need a bigger dev data cultureSimon Dittlmann
 
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on Kubernetes
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on KubernetesIBM Bluemix Nice meetup #5 - 20170504 - Container Service based on Kubernetes
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on KubernetesIBM France Lab
 
(ARC401) Cloud First: New Architecture for New Infrastructure
(ARC401) Cloud First: New Architecture for New Infrastructure(ARC401) Cloud First: New Architecture for New Infrastructure
(ARC401) Cloud First: New Architecture for New InfrastructureAmazon Web Services
 
Exponentiële groei v2
Exponentiële groei v2Exponentiële groei v2
Exponentiële groei v2guest6b41899
 

Viewers also liked (19)

Multi-container Applications on OpenShift with Ansible Service Broker
Multi-container Applications on OpenShift with Ansible Service BrokerMulti-container Applications on OpenShift with Ansible Service Broker
Multi-container Applications on OpenShift with Ansible Service Broker
 
Docker swarm-mike-goelzer-mv-meetup-45min-workshop 02242016 (1)
Docker swarm-mike-goelzer-mv-meetup-45min-workshop 02242016 (1)Docker swarm-mike-goelzer-mv-meetup-45min-workshop 02242016 (1)
Docker swarm-mike-goelzer-mv-meetup-45min-workshop 02242016 (1)
 
Sprint 49 review
Sprint 49 reviewSprint 49 review
Sprint 49 review
 
How to Scale Your Architecture and DevOps Practices for Big Data Applications
How to Scale Your Architecture and DevOps Practices for Big Data ApplicationsHow to Scale Your Architecture and DevOps Practices for Big Data Applications
How to Scale Your Architecture and DevOps Practices for Big Data Applications
 
IBM Containers- Bluemix
IBM Containers- BluemixIBM Containers- Bluemix
IBM Containers- Bluemix
 
Get complete visibility into containers based application environment
Get complete visibility into containers based application environmentGet complete visibility into containers based application environment
Get complete visibility into containers based application environment
 
Raleigh DevDay 2017: Deep Dive on AWS Management Tools
Raleigh DevDay 2017: Deep Dive on AWS Management ToolsRaleigh DevDay 2017: Deep Dive on AWS Management Tools
Raleigh DevDay 2017: Deep Dive on AWS Management Tools
 
Retelling nonfiction
Retelling nonfictionRetelling nonfiction
Retelling nonfiction
 
Monitoring and tuning your chef server - chef conf talk
Monitoring and tuning your chef server - chef conf talk Monitoring and tuning your chef server - chef conf talk
Monitoring and tuning your chef server - chef conf talk
 
IoT and Big Data
IoT and Big DataIoT and Big Data
IoT and Big Data
 
Evolutions et nouveaux outils SEO
Evolutions et nouveaux outils SEOEvolutions et nouveaux outils SEO
Evolutions et nouveaux outils SEO
 
Reversing Engineering a Web Application - For fun, behavior and detection
Reversing Engineering a Web Application - For fun, behavior and detectionReversing Engineering a Web Application - For fun, behavior and detection
Reversing Engineering a Web Application - For fun, behavior and detection
 
Do we need a bigger dev data culture
Do we need a bigger dev data cultureDo we need a bigger dev data culture
Do we need a bigger dev data culture
 
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on Kubernetes
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on KubernetesIBM Bluemix Nice meetup #5 - 20170504 - Container Service based on Kubernetes
IBM Bluemix Nice meetup #5 - 20170504 - Container Service based on Kubernetes
 
(ARC401) Cloud First: New Architecture for New Infrastructure
(ARC401) Cloud First: New Architecture for New Infrastructure(ARC401) Cloud First: New Architecture for New Infrastructure
(ARC401) Cloud First: New Architecture for New Infrastructure
 
Question 7
Question 7Question 7
Question 7
 
Exponentiële groei v2
Exponentiële groei v2Exponentiële groei v2
Exponentiële groei v2
 
Veselík 1
Veselík 1Veselík 1
Veselík 1
 
What is dev ops?
What is dev ops?What is dev ops?
What is dev ops?
 

More from F-Secure Corporation

How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?F-Secure Corporation
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!F-Secure Corporation
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceF-Secure Corporation
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsF-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace F-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceF-Secure Corporation
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?F-Secure Corporation
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3F-Secure Corporation
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2F-Secure Corporation
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeF-Secure Corporation
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Corporation
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsF-Secure Corporation
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big businessF-Secure Corporation
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業F-Secure Corporation
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?F-Secure Corporation
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetF-Secure Corporation
 

More from F-Secure Corporation (20)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 

Recently uploaded

GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 

Recently uploaded (20)

GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 

Five imperatives for advanced cyber security

  • 1. Fiveimperatives foradvanced cybersecurity What it takes to detect and respond to advanced cyber threats CYBER SECURITY INSIDER – EBOOK 3/3
  • 2. 2CYBER SECURITY INSIDER – EBOOK 3/3 Advancing thestate ofyour cyber security
  • 3. 3CYBER SECURITY INSIDER – EBOOK 3/3 Advancing thestateofyour cybersecurity In the simplest possible terms, advanced cyber security is about stopping most breaches from happening, rapidly detecting the ones that do happen and then moving as quickly as possible to minimize their impact. It’s a far cry from the primarily defensive approach to cyber security that most companies are used to and set up for. Instead, it’s a proactive and dynamic discipline that’s constantly evolving – just like the infrastructure you’re protecting and the threat landscape you’re protecting it from. Getting this right comes down to two things: increasing the relevance of the information available to your team and reducing the amount of time spent between breach, detection and remediation. In this eBook we’ll be taking you through what we’ve found to be the five most important measures for advanced cyber security: 1. Collecting and managing forensic evidence 2. Using analytics to detect anomalies 3. Cutting through the noise with human expertise 4. Learning from threat intelligence 5. Creating (and rehearsing) incident response plans We’ll explain why these measures are so crucial and how to implement them in the real world. Let’s start. Catch up on the rest of the Cyber Security Insider series In case you missed them, check out the last two eBooks from this series. In the first eBook, ‘The Chaos of a Corporate Attack’, we looked at how one company was breached and what the impact of the breach was. In the second, ‘How CISOs deal with advanced cyber threats’, we looked at the steps (both good and bad) European CISOs were taking to protect their companies.
  • 4. 4CYBER SECURITY INSIDER – EBOOK 3/3 Collecting andmanaging forensic evidence
  • 5. 5CYBER SECURITY INSIDER – EBOOK 3/3 When a breach is detected, the first step is a forensic investigation to figure out what the attacker did, what systems he had access to, how he got in, and how long he spent in the network. That takes evidence. The better the evidence, the easier and quicker the investigation goes. More important, it’s only once you’ve collected accurate forensic information that you can start to formulate an appropriate cleanup plan. So evidence is key. But having the right evidence means having access to a long-term history of relevant events collected from endpoints, servers, and the network. And that can be challenging for a couple of reasons: There’s no definitive list of what evidence to collect. That’s because the type of events you’ll want to collect and store will depend largely on your infrastructure and the type of attacks you expect to be hit with. At the same time, you can’t possibly log everything either. Network bandwidth, application performance, storage constraints and the sheer complexity of processing huge volumes of data make ‘store it all’ an untenable strategy. So you need to pick your sources wisely. LIVING OFF THE LAND Most companies fail to detect breaches quickly enough. In fact, in most of the cases we’ve worked on, the intruders that gained access to the corporate network remained undetected for months before finally being hunted down. Collecting andmanaging forensicevidence
  • 6. 6CYBER SECURITY INSIDER – EBOOK 3/3 Some sources of information – like system logs, web logs, and firewall logs –are obvious choices for collection. But when it comes to picking which other events you should track, it helps to create a feedback loop. In this process, your security experts perform an analysis of the situation, use that analysis to determine what data to collect, and then use that data to perform a subsequent analysis of the same situation. This cyclical approach, which we recommend repeating on a regular basis, will allow your security experts to evaluate their coverage, check that they’re gaining visibility into all levels of your infrastructure and see if they’re collecting data relevant to the types of attacks you should expect. We’ve found it takes two full-time experts to run this process properly. A process for picking the right sources Collecting andmanaging forensicevidence
  • 7. 7CYBER SECURITY INSIDER – EBOOK 3/3 Best practices for smarter data collection Most of the choices you make around evidence collection will need to be specific to your company and infrastructure. But there are some pieces of advice around data collection that are broadly applicable. - Log outbound connections. It’s surprising how many companies only log incoming connections. Outgoing connections can provide clues about command and control server connections and data exfiltration activities, as well as potential insider threats. Of course, your ability to do this may be constrained by the volume and type of network traffic your organization experiences. Bonus tip: remember to log IP addresses and not just reverse-DNS names. - Collect access logs. This should include detailed logs from domain controllers and other authentication servers. These are extremely useful for forensic investigative work. - Look out for Network Address Translations (NAT) routers. If you aren’t aware of any NATs inside your organization, you may find that some of your system logs show all inbound traffic originating from a single IP address. As you’d imagine, this makes forensic investigations a lot harder. - Log data during incidents. If you notice (or suspect) an attack is underway and your logging is broken or inadequate, all is not lost. Just fix the problem immediately. This is actually a great time to turn the dial up on what you’re collecting and logging. The more data you can collect during an incident, the better. Once you’re in the clear, you can always scale your data collection back down. - Perform regular drills. Not only will you need to do this to check you’re logging everything you need to, it’ll also ensure you know where to find all the data you’ve been collecting when something goes wrong. - Keep up with the threat landscape. Learn what attackers are doing. And make sure the data you’re collecting is relevant to the type of attacks you’re expecting to see Collecting andmanaging forensicevidence
  • 8. 8CYBER SECURITY INSIDER – EBOOK 3/3 Protecting your evidence Intruders will invariably try to cover their tracks. Often, this will mean tampering with the evidence you need to run a forensic investigation. So once you start collecting the right evidence, aim for a safe, tamper-proof evidence storage strategy and an adequate retention policy. Collecting logs in a centralized storage platform, such as a Security Incident and Event Management system (SIEM), is a smart way to protect against tampering. But whatever central location you choose to use, what’s important is that you collect and store logs from hosts and devices across your network. And that you then retain those logs for a long enough period of time to ensure you have access to a copy of that data, should you need it for forensic evidence. We recommend the following practices: - Aim for a data retention policy of at least two years. - Make sure you’re synchronizing the time across all machines on your network (via NTP). And if your organization’s spread across multiple geographic locations, make sure you’re aware of time zone differences. - Ensure your data storage has proper access controls surrounding it to reduce the chances of tampering. - Make sure you have a solid, working backup policy in place for all collected and stored data. Collecting andmanaging forensicevidence
  • 9. 9CYBER SECURITY INSIDER – EBOOK 3/3 Usinganalytics todetect anomalies
  • 10. 10CYBER SECURITY INSIDER – EBOOK 3/3 Once you’ve defined a set of events and data worth collecting (and built the infrastructure to aggregate it), you can start the process of hunting for anomalies, signs of intrusion and suspicious behavior. Ideally, you’ll want to process incoming data on-the-fly. But you’ll also want to process historical data against new Indicators of Compromise (IoCs) and rule-sets as dictated by changes in threat intelligence. It’s smarter to process large volumes of data like these with statistical analytics, rather than going line-by-line. So you’ll need automation and big data analytics to perform these sorts of analyses well. We’ve found that using freely available engines (such as Graylog and ELK Stack) makes this process far easier than attempting to build your own technology stack. Usinganalytics todetect anomalies Threat intelligence Threat intelligence is a loosely defined term used to represent all sorts of information ranging from high-level political and strategic advice to streams of technical data designed for machines to process. For the purposes of this eBook, when we talk about threat intelligence, we’re referring to knowledge of the threat landscape and the tactics, techniques and procedures (TTPs) used by attackers, as well as low-level technical data such as IoCs.
  • 11. 11CYBER SECURITY INSIDER – EBOOK 3/3 When it comes to seeking out anomalies and malicious behavior, we’d recommend starting here: Correlate collected data against threat intelligence feeds. Obvious feeds to start with include known-malicious IP addresses, domains, and file hashes. Look for anomalous access management log patterns. Examples might include a single non-admin user attempting to log into multiple servers, or one machine attempting to log into a server under multiple different accounts. Look for activity that might point to an intruder using brute force methods. This might include hundreds of thousands of login attempts in a suspiciously small time frame. Seek out patterns of unusual user behavior. An example of this would be an SSH connection originating from a non-technical user’s machine. Flag activity that appears to happen at odd times. Such as in the middle of the night, on weekends, or during public holidays. Look for signs of tunnelling software. A commonly used example is called Teredo. The advice listed above is just a subset of all the possible ways to detect anomalies. But we’ve found these methods are particularly useful in the current threat landscape. Of course, over time, you should continue to tune your own analytics models for the sorts of threats you expect to face based on a deeper understanding of the tactics, techniques and procedures (TTPs) used by attackers. Usinganalytics todetect anomalies
  • 12. 12CYBER SECURITY INSIDER – EBOOK 3/3 Cuttingthrough thenoisewith humanexpertise
  • 13. 13CYBER SECURITY INSIDER – EBOOK 3/3 There are some incredibly sophisticated analytic methods for detecting anomalies. But they are by no means a viable replacement for real human intuition. Because no matter how well configured your analytics tools are, they will produce noise – false positives and unnecessary alerts. Configure the rules to be too aggressive and a real incident might end up buried in noise. Configure the rules to be too relaxed and your tools might not flag suspicious activity at all. So effective cyber security depends on the use of both analytics and human security experts. This is perhaps the most important fact of advanced cyber security. Because there’s a whole range of potential attacks on your infrastructure. And no automated tool can be prepared to tackle all of them without human expertise and intuition to guide your security strategy. Cuttingthrough thenoisewith humanexpertise On one end of the spectrum, there are uncoordinated attacks by cyber criminals that threaten your end-users with ransomware, bots and other crime ware and poison your externally facing web servers with exploit kits. These aren’t the most sophisticated attacks. But they can leave your organization exposed. For instance, it’s not uncommon for more organized attackers to purchase access to compromised machines on corporate networks from other criminal organizations. It’s an easy and cheap way in. On the other end of the spectrum, you’re also susceptible to advanced threat actors who’ll target and access your internal network. These attacks can be as well planned as a military campaign. And you need experts who understand the details of how these attacks work to detect them. In these cases, attackers usually get in through vulnerable software, SQL injection attacks or ‘social engineering’ tricks that get users to run a Trojan on a corporate machine. The broad spectrum of advanced cyber threats
  • 14. 14CYBER SECURITY INSIDER – EBOOK 3/3 Once they’re in, they have a number of ways to get data out Advanced exfiltration techniques include wrapping data in encrypted packets or password-protected zip files, using social media or webmail sites for uploads, or even use steganography (the practice of concealing secretive data in non-secretive text or image files) or peer-to-peer file transfer. Once in, these intruders can map out your network and systems in search of data or opportunities for lateral movement, while laying low for weeks. They’ll even install rootkits, destroy evidence of their presence, steal accounts and start to harvest your data. From there they can exfiltrate data using techniques that are hard to detect because they mimic normal user behavior. The point of all this isn’t to spook you. It’s to explain the practical reality that sophisticated attackers know how to evade common detection methods. So it takes a combination of well-configured analytics tools and the keen, trained eyes of human experts to catch them. Cuttingthrough thenoisewith humanexpertise
  • 15. 15CYBER SECURITY INSIDER – EBOOK 3/3 Learning from threat intelligence
  • 16. 16CYBER SECURITY INSIDER – EBOOK 3/3 As we mentioned earlier, ‘threat intelligence’ is a pretty broad term that can be used to describe everything from strategic political advice to more tactical information on IoCs that’s designed for machines. TECHNICAL THREAT INTELLIGENCE You can buy technical threat intelligence feeds from a variety of third parties. These are ideally used as inputs to correlation rules in SIEM systems or other event analysis systems. Technical threat intelligence feeds often have short lifetimes so you need to keep refreshing them and running them against collected data in order to make sure they’re still valid. You can use these feeds in a variety of ways. For instance, a feed containing a list of malicious IP addresses can be parsed and used to automatically configure firewall or Intrusion Detection System (IDS) rules. Experts can, and often do, combine multiple technical threat intelligence feeds to create new types of intelligence that can be applied to your collected data. Learningfrom threatintelligence Given the number and scope of technical threat intelligence feeds available, it makes sense to carefully select data that’s relevant to your organization’s specific needs. This is where tactical threat intelligence comes into play.
  • 17. 17CYBER SECURITY INSIDER – EBOOK 3/3 Tactical threat intelligence Tactical threat intelligence educates your security experts about the threat landscape. This sort of intelligence can be gleaned from a number of different sources like news feeds, social media, RSS feeds, chat forums and mailing lists. These kinds of sources are great because they ensure your experts regularly gain knowledge and experience that can then be used to create rules, automation, and analytics models to detect potential threats. In fact, it actually helps them pick which technical threat intelligence feeds to source. Tactical threat intelligence provides important context. It describes the ‘who’, ‘why’ and ‘how’ you need to understand and properly prepare against modern threats. Understanding your attackers At the end of the day, you can only derive actionable threat intelligence from a deep understanding of how attackers operate. Good attackers understand the defenses they’re going to face. They’re stealthy, they know how to evade common detection methods and they understand how companies operate. Soifyou’regoingtomountasoliddefense,you andyourteamneedtoknow asmuch about them,theirmethodsandtheirmotivesasyoucan. One way to look at threat intelligence is as a series of feeds you can buy and plug into your THINKING LIKE AN ATTACKER To really get under the skin of the kind of people who attack corporate networks, it helps to know some of those people (or at least know people who know them). It’s why we work so closely with people who’ve been on the other side. SIEM. But used well, they’re a whole lot more. They’re tools for education. It’s about gaining the mindset and skillset of an attacker and using that knowledge to counter them. Learningfrom threatintelligence
  • 18. 18CYBER SECURITY INSIDER – EBOOK 3/3 Creating (andrehearsing) incident responseplans
  • 19. 19CYBER SECURITY INSIDER – EBOOK 3/3 By doing this, you’ll gain insight into what they did, how they did it and why, while also being better placed to catch them in a way that blocks them completely. Wementionthisbecausewithout aclear and coherent incident responseplan,thechaosof themoment dictateshoweveryonereacts. That’saproblemat thebest oftimesand potentiallydisastrousinthemiddleofanincident. Incident response plans are one of those things you never want to use. But when the time comes to use them, you’ll really wish you had one. So here are some pieces of advice on what it takes to get incident response plans right. Creating (andrehearsing) incident responseplans In almost all cases, when a company realizes they’ve been breached, the responding team’s instinct is to quickly block the attacker. That might mean taking a machine offline, closing down an account or adding a firewall rule. But while these quick fix, knee-jerk reactions sound good at the time, all they end up doing is alerting the intruder to the fact that you’re onto them. Invariably, the attacker stops what they’re doing, lays low until things calm down – and then gets back to work. A better approach is to observe the intruder, and carefully investigate the situation as thoroughly as possible without alerting them.
  • 20. 20CYBER SECURITY INSIDER – EBOOK 3/3 when they’re run through. Record the amount of time it would take you to recover from the scenario. And adjust your plans depending on the results. We’d also highly recommend testing your plans with real attacks. Prepare communications channels. Know who you need to notify about what, and when if something went wrong. Prepare a list of contacts and make sure it’s kept up-to-date. Think about what you might need to tell your customers. In the chaos of a real incident, you’ll have very little time to communicate detailed, well-groomed statements. So decide on the minimum communications needed and then plan for them. Plan for the most relevant attack scenarios. By studying the threat landscape and reading about incidents other companies have faced, you should be able to assemble hypothetical attack plots that can then shape your incident response plans. Define and train an incident response team. Make sure you know who’s meant to do what, identify how communication channels should work and identify any secondary resources you might need for things like forensic investigation. Practice your plans. Simulate different incidents on your scenario list. Make sure your plans work Prepare “emergency first aid” guidelines for admins and staff. And then test them on those guidelines periodically. Train your response team on how to dive into forensics once they hit the scene. Train your whole staff to be aware of attack vectors relevant to their positions. Make sure you have centralized logging set up. Make sure it works. Test it to make sure it’s recording the amount and types of information you’ll need for an investigation later. Don’t pull the power plug on any device you think is compromised. You’re going to want to get memory forensics from affected devices so keep them going. Train your staff to disconnect the network from compromised devices. This includes disabling Wi-Fi, Bluetooth, and mobile broadband connections. Secure the logs from a compromised machine. Ideally, your centralized logging mechanisms should be doing this anyway. But it helps to train certain staff about how best to respond to a potentially compromised machine. Make sure they preserve logs from surrounding systems such as firewalls and active directory. This will help you verify how widespread the breach is. Creating (andrehearsing) incident responseplans
  • 21. 21CYBER SECURITY INSIDER – EBOOK 3/3 Don’t trust anything on the compromised machine. Common tools are often “trojanized” and may give false readings. Make sure your network diagrams are readily available and up-to-date. This speeds up response rates a whole lot more than you’d think. Reset passwords and authentication. If you suspect that user passwords or other authentication factors were used in the attack, or if things like password hashes have been leaked, reset the passwords of affected users. Figure out the root cause before you re-create breached systems. When the incident is over, you might be tempted to just re-create breached systems from backup. But without a clear understanding of the root cause, it’s very likely that the attack vector will still exist and the machines might soon be compromised again. So it’s crucial you understand the root cause, mitigate against it and then get the system back online. Incident response is an essential aspect of modern crisis and risk management. And the best plans come with C-level buy-in. This might sound like the kind of thing executives would roll their eyes at. But the reputational and professional implications of dealing with a breach have meant the smartest companies just want to get this kind of thing right. If you’re still reading this eBook, you’re likely working for one of them. The resources needed to respond For most organizations, it’d take a team of about ten trained experts to launch an appropriate investigation into an incident. Since it doesn’t make sense to staff that many experts for every organization, it helps to know where you can find the external experts needed to handle incident escalations. Creating (andrehearsing) incident responseplans
  • 22. 22CYBER SECURITY INSIDER – EBOOK 3/3 Tackling advanced threats headon
  • 23. 23CYBER SECURITY INSIDER – EBOOK 3/3 The attackers and tools your corporate infrastructure’s up against have never been more sophisticated. So detecting them, responding to them and investigating them takes a deep understanding of how they work. Of course, this is further complicated by the fact that attackers know how to evade prevention and detection measures and have their own in-depth knowledge of companies and their tactics. Which is why modern cyber security can’t rely on static, defensive measures only. Tackling advanced threats headon It takes the combination of human expertise, analytics, and a constantly growing pool of relevant data and threat intelligence to get this right. The good news is that the information, technology and skill needed to detect anomalies and react to them rapidly already exist. So we hope you follow the tips and advice we’ve shared in this eBook. And crucially, we hope you won’t stop learning about how to improve your approach to cyber security. It’s just too important to ignore.
  • 24. 24CYBER SECURITY INSIDER – EBOOK 3/3 And we’ve been a part of the security industry for over 25 years. It’s why we’ve become a trusted advisor to both industries and EU law enforcement agencies across Europe. In fact, we’ve been involved in more European crime scene investigations than any other company on the market. Our Cyber Security Services help companies react faster, learn more and respond more intelligently to threats and breaches of all sizes. So if you’re one of the smart ones and you’re getting serious about cyber security, we should talk. thE CYBER SECURITY INSIDER series Read ‘The Chaos of a Corporate Attack’ to find out how one company was breached and how it impacted them. Read ‘How CISOs deal with advanced cyber threats’ to find out what European CISOs are doing to protect their companies (and what they shouldn’t be doing). We’re f-secure