Skip to content

Latest commit

 

History

History
320 lines (203 loc) · 8.2 KB

mitreattckcon2019prioritizingattckinformeddefensestheciswaylanglois-verizonfranklin-cis-191114214652.pdf.md

File metadata and controls

320 lines (203 loc) · 8.2 KB

Prioritizing ATT&CK Informed Defenses The CIS Way

Philippe Langlois Senior Risk Analyst Verizon DBIR

Joshua M Franklin

Senior Cybersecurity

Engineer

Center for Internet

Security

1

Joshua Franklin Background

· Product owner of CIS Controls v7.1 · 10 years in the US government ­ NIST ­ Election Assistance Commission · Telecommunications security, mobile security, mobile app vetting ­ Contributor to Mobile ATT&CK · Election security · Cybersecurity standards (e.g., NIST, CIS, IEEE, OASIS, 3GPP)

Game of Phones 2

Philippe Langlois Background · Current: ­ Verizon DBIR Co-Author · Former ­ Product Owner @ CIS ­ CIS Controls ­ Nationwide Cyber Security Review ­ Integrated Product Team Lead · Focus on risk management and cyber security · Can maybe code himself out of a paper bag 3

Defender's Dilemma · What's the right thing to do, and how much do I need to do? · How do I actually do it? · And how can I demonstrate to others that I have done the right thing? 4

CIS Background · US-based forward-thinking, non-profit entity that harnesses the power of a global IT community · Goal of safeguarding private and public organizations against cyber threats · CIS Vision: Leading the global community to secure our connected world · CIS Mission: ­ Identify, develop, validate, promote, and sustain best practice solutions for cyber defense ­ Build and lead communities to enable an environment of trust in cyberspace 5

Multi-State Information Sharing and Analysis Center The MS-ISAC has been designated by DHS as the key resource for cyber threat prevention, protection, response and recovery for the nation's state, local, tribal, and territorial governments https://www.cisecurity.org/ms-isac/ 6 TLP: WHITE

Security Best Practices · CIS Benchmarks ­ Community developed security configuration guidance ­ Covers major applications and OS ­ Recognized by FISMA, FedRAMP, and PCI ­ Freely available in PDF Format · CIS Controls ­ Internationally utilized standard ­ Making best practice, common practice

140+ benchmarks available · RHEL 8, · Microsoft Windows Server 2019, Kubernetes, · Cloud Foundations for AWS, · Azure, · GCP, · Ubuntu, · CentOS Get involved! https://workbench.cisecurity.org 7

NSA/DoD Project The Consensus Audit Guidelines (CSIS) "The SANS Top 20" (the SANS Institute) The Critical Security Controls (CCS/CIS) 8

9

Implementation Groups CIS defines Implementation Group 1 as Basic Cyber Hygiene 10

From Opinions to Data

Five schmucks in a room

Evolving the CIS Controls Selection Process

Five thousand friends on a mailing list

Mapping to authoritative problem summaries

Reinforce with manual analysis, lab testing, honeypot experiments

Ongoing tagging of attack summaries at the source

Mapping from standard patterns, templates, formal expressions of attack data

Ongoing query & hypothesis testing across a distributed system of cooperating data stores

Lower

Leverage, Scalability, Repeatability

Higher

11

"Pre" ATT&CK 12

Community Attack Model v1.0 · CIS effort to analyze pertinent information relating to realworld attacks in the wild · Goal: help enterprises make good choices about the most effective defensive actions they can take · Released via Blackhat in 2016 · Leverages additional frameworks such as NIST CSF and Lockheed Martin Cyber Kill Chain 13

Why a Community Attack Model?

· Ensure offense informs defense

· Able to better prioritize defensive controls based on real-world techniques

· Communicate trade-offs

­ What techniques are likely to be successful if I don't put a control in place?

· Most enterprises can't go on their own

­ Or do it more than once

14

Community Attack Model v1.0 15

Literature Review

· Verizon Data Breach Investigations Report

Before

· FireEye M-Trends Report

· ESET Cybersecurity Trends

· Symantec Internet Security Threat Report · Arbor Networks Worldwide Security Report

After

· IBM X-Force Threat Intelligence Index

· Microsoft Security Intelligence Report

· Akamai [State of the internet]

·...

16

Harnessing the Literature

· If you want data, it's available · But... ­ Reviewing is time intensive ­ Inconsistent language ­ Vendor biases ­ Sometimes Marketing focused ­ Often difficult to get underlying data and check their work

More concisely:

  1. How do we compare reports?
  2. How can we use them?

17

50ccs of ATT&CK 18

Towards Standardization · We can engineer a solution to some of these problems ­ Specifically, the use of standard language · MITRE ATT&CK can be used as a lingua franca · Mitigations were added as an object (huzzah!) · Working to map the CIS Controls to MITRE ATT&CK 19

Controls to Mitigations to Techniques v0.1 20

Community Attack Model v2 · Revamp of the Model · Tie to a standard method of expression · General methodology: ­ Analyze data sources ­ Identify key attack paths ­ Identify mitigations for key attacks ­ Map mitigations to CIS Controls · Output: ­ Mapping of the CIS Controls to MITRE ATT&CK ­ Mapping of the CIS Controls to MITRE ATT&CK Mitigations ­ Data-backed attack patterns that the CIS Controls defend against 21

How to Prioritize ATT&CK

· ...let's make a network ­ What are central points for Adversaries ­ What are the central points for Software

· Caveats

­ This just tells us what is commonly found in ATT&CK, NOT what is found out there in the wild

­ Focused largely on APT

22

We Need Real Data · MS-ISAC + EI-ISAC to the rescue · 100+ network sensors, · 100+ forensic reports a year 23 https://www.cisecurity.org/blog/top-10-malware-june-2019

Top 6 Malware Techniques to Controls 24

Attack Paths · Logical ordering of events and techniques that occur ­ Conditions have to be right for the attack to be successful · We "control" the environment and circumstances that they have to operate in · What are the conditions and preconditions required for certain techniques? ­ Are certain techniques more commonly used with conditions that we can more easily influence 25

How to Identify Attack Patterns of Note · Identifying relevant attack paths is difficult · How to define relevance: ­ Number of breaches attributed? ­ Criticality of affected assets? ­ Financial impact of breaches? ­ Number of times we're forced to read a security blog about the topic? · Verizon says 28% of all breaches can be attributed to malware · Verizon also states that 30% of those incidents can be attributed to ransomware ­ Let's explore the attack path and mapping to CIS Controls 26

WannaCry Ransomware 27

NotPetya Ransomware 28

Xbot Android Malware

... of course it's not shared in Mobile ATT&CK!

29

Attack Paths

· Ransomware contains the Data Encrypted for Impact technique · MITRE maps Data Encrypted for Impact to Data Backup · Data Backup can be mapped to CIS Controls 10.1 and 10.5

10

10.1

Ensure Regular Automated BackUps

Ensure that all system data is automatically backed up on a regular basis.

10

10.2

Perform Complete System Backups

Ensure that all of the organization's key systems are backed up as a complete system, through processes such as imaging, to enable the quick recovery of an entire system.

10

10.3

Test Data on Backup Media

Test data integrity on backup media on a regular basis by performing a data restoration process to ensure that the backup is properly working.

Ensure that backups are properly protected via physical security or encryption

10

10.4 Ensure Protection of Backups when they are stored, as well as when they are moved across the network. This

includes remote backups and cloud services.

10

10.5

Ensure Backups Have At One Non-Continuously

least Ensure that all backups have at least one backup destination continuously addressable through operating system calls.

that

is

not

30

Pipe Dream

SOC Incident Response Intel

Community Attack Model

Controls System Hardening Risk Management

OPERATIONS

Vulnerability Management

POLICY

31

Next Steps · Continue developing the CIS Community Attack Model · Help vet the Controls mapping to MITRE ATT&CK and ATT&CK Mitigations · Use Community Attack Model to improve Controls v8 and the Implementation Groups · Reach out to: [email protected] · Join the Community: https://workbench.cisecurity.org 32

Thank You Philippe Langlois [email protected] @langlois925 Confidential & Proprietary

Joshua M Franklin [email protected] @thejoshpit 33