36
Confidential Document 1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal, Ottawa, Toronto and Bahamas working with 160 customers in 11 countries

Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Embed Size (px)

Citation preview

Page 1: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 1

Speaker

• Robert Potvin, CISSP & CBCP

• 15 years of IT Security Experience

• Senior Consultant of Above Security

• Operations in Montreal, Ottawa, Toronto and Bahamas working

with 160 customers in 11 countries

Page 2: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 2

ISO-17799 Overview

• BS7799 was created in 1999 as a two part document (standard + certification scheme) by the British Standards Institution (BSI)

• The standard portion was adopted and converted into an ISO standard in 2000

• The certification scheme portions is still a BSI only standard and it’s latest revision is dated 2002

• Many worldwide governments policies, standards, guidelines and best practices are based, inspired or in compliance with ISO17799:2000 & BS7799-2:2002 and some of them don’t even know it

• There is a general misconception that it is not a complete standard because it lacks implementation guidelines

• Since it was built by a standard organization (BSI), the implementation guidelines where intentionally left out of the document and regroup into other specific standards and “security techniques” (i.e.: ISO13335, PAS56…)

Page 3: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 3

ISO-17799:2000 Overview

• 127 controls distributed within 10 categories- Information security policy- Organizational security- Asset classification and control- Personnel security- Physical & environmental security- Communication & operations management- Access control- System development & maintenance- Business continuity management- Compliance

• Uses a Plan/Do/Check/Act implementation and operation model that starts with a risk assessment to established the required security controls needed to adequately manage information security risks within the business processes

• Used in conjunction with BS7799, it also establish documentation, revision, communication, training, auditing and continuous improvement requirements

Page 4: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 4

ISO-17799 Overview

• Complementary standards and guidelines where inspired by ISO17799, design to or supports the implementation of ISO17799:

- AS/NSZ-4360:2004, Risk Management Guidelines- HB-231:2004, Information Security Risk Management Guidelines- ISO-19011:1996, Guidelines for Management System Auditing- PAS56:2003, Guide to Business Continuity Management- ISO/TR-18044:2004, Information Security Incident Management- ISO-GMITS:1996/2001 (Guidelines for the Management of IT Security):

• ISO/TR-13335/1:1996, Concepts and Model for IT Security• ISO/TR-13335/2:1997, Planning IT Security• ISO/TR-13335/3:1998, Management of IT Security• ISO/TR-13335/4:2000, Selection of safeguards• ISO/TR-13335/5:2001, Management guidance on network security

• CoBIT control objectives are fully mapped to support ISO17799

• ITIL is especially efficient for ‘Communication & Operations Management’

Page 5: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 5

What’s new in ISO-17799:2005 ?

• Risk management where addressed only in part 2 document, the part 1 now includes a new chapter on ‘Risk Assessment and Treatment’ requirements

• ‘Asset classification and control’ evolve into a more holistic ‘Asset management’ approach

• ‘Personnel Security’ evolve into ‘Human resources security’ which now emphasis on what’s needed before, during and on termination of employment

• ‘Communication and operations management’ now includes service delivery management of 3rd parties (i.e.: outsourcer performance and security obligation monitoring)

• Introduction of ‘Technical Vulnerability Management’

• Incident management controls that where spread all around the previous version of the standard are now consolidated within a new chapter titled ‘Information Security Incident Management’

• In short: 2 new control families, a new total of 135 controls, over 80 changes within the existing controls (deletion/addition/modification)

Page 6: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 6

Defining Information System

Networking(TCP/IP, FW, Router, Switch)

Operating Systems(Win2K, XP, Unix, OS/400…)

Application Servers(IIS, SQL, WebSphere, Oracle…)

Applications(Web, SAP, PeopleSoft…)

Users Customers

Copyright 2004 - Above Security

Information System

Page 7: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 7

• Assets oriented Information Security: - Protecting Confidentiality- Insuring Integrity- Preserving Availability- Addressing Compliancy- Augmenting Reliability

• Business oriented information security:- Managing risk- Insuring business continuity- Protecting corporate image- Protecting shareholders’ value

Defining Information Security

Copyright 2004 - Above Security

Page 8: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 8

• From Technology Protection to People and Process:

• False sense of protection…..

- Firewalls- VPNs- IDS- Applications- Wireless

Defining Information Security

Copyright 2004 - Above Security

Page 9: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 9

Problems with Firewalls

•Definition- A Firewall filters available services from your company incoming from and outgoing to the Internet.

•Problems- Will not prevent hackers from interacting with your company.

- Often badly configured incoming and outgoing.- Logging is often poorly configured.- Who checks the Logs ?

Page 10: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 10

Problems with VPN

•Definition- Virtual Private Network.- Remote access system. - Replacing traditional dial-up modem pools on the net.

•Problems- Inexpensive to attack.- Often available for Whoever, Whenever, Wherever.- Few companies use strong authentication.- Once inside, there is no limited field of action to users.

Page 11: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 11

Problems with IDS

•Definition- Intrusion Detection System

•Problems- False positives, false negatives.- Limited load capacity- Correlation of event is painful.- Companies often only use the network IDS.- 24x7 monitoring is required.- Incident handling and response procedure often lacking.

- IDS are only alarm systems – useless without monitoring and a central police force.

Page 12: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 12

Problems with Applications

Problems:- Privileges:

• Web server volume and client-server applications with plenty of privileges.

- Developers Inexperience:• Often no security training.• Insufficient controls and logs to protect

systems.

- Validation:• Insufficient validation in data entry and data

consultation.– Important information leakages.

Page 13: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 13

Problems with Wireless

•Problem- Only 25% of companies use the WEP.- Give an unwatched access to the internal network.

•Bad Architecture (Direct access to internal network)

•Examples:- Jamaica – New Kingston.

• More than 80 access points were discovered.• 80% did not use the WEP.

- Montreal (in 2 hours)• More than 200 access points discovered.• 85% did not use the WEP.

Page 14: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 14

•Formal and structured attack simulation against your infrastructure

•An attack that will try to use any privileges and information available to both legitimate and non legitimate users to gain access to confidential information

•An approach that will try to exploit every weaknesses of your systems both internal, external, application and physical

•A formalized operation that will outline what are your exposure to attacks and how complex conducting those attack might be

How to diagnose? Penetration Testing

Copyright 2004 - Above Security

Page 15: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 15

Five step to successful penetration1. Gaining knowledge about the victim, it’s

network, services and applications2. Scanning the overall infrastructure for

potential vulnerabilities that might be present at the various layers

3. Exploit the security breaches to gain access to your systems that might enable us to go further in your network

4. Implement backdoor to preserve the access5. Erase the traces

Penetration testing steps

Copyright 2004 - Above Security

Page 16: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 16

• Being able to gain access to confidential customer database

• Being able to access medical information of patient on an hospital network

• Being able to create a bank account and conduct fraudulent financial transaction

• Being able to hack the wireless network and gain full access to the internal network

• Being able to hack the backup server and access confidential information that where not under access control like on the rest of the network

Example of successful hack

Copyright 2004 - Above Security

Page 17: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 17

• Being able to take control of the corporation central database server

• Being able to control the SCADA infrastructure for lighting, gaz and water treatment facilities

• Being able to steal intellectual property and application source code

• Being able to control the security camera systems

• And the list can goes on forever…

Example of successful hack

Copyright 2004 - Above Security

Page 18: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 18

•Information Security Challenges:- Providing universal access to data and systems- Establishing the right value to assets- Identifying system weaknesses- Efficiently monitoring the assets- Building a corporate culture- Reaching the right balance between risk, exposure, usability, protection and investments

But how ?

What are we left with ?

Copyright 2004 - Above Security

Page 19: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 19

•Governance is: doing things the way they should be done to protect the business, the employee and shareholders value

•Risks and threats are real and could have significant impact on your business

•Information security is the responsibility of the board; members should sign off the policy

•Information assets possess value; proper protection should therefore be in place

•Information security is not free; like any investment, it should be properly managed

Security Governance

Copyright 2004 - Above Security

Page 20: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 20

•Information security governance should deliver:- Strategic alignment: orientations are driven by business

requirements, not technology, and should impact productivity as little as possible

- Direction: a standard set of practices coupled with proper effort distribution, keeping focus on areas with the greatest impact and business benefits

- Risk management: a list of risks we agree to live with, a proper understanding of risk exposure and a sufficient awareness of management priorities

- Measurement: a defines set of metrics to independently obtain assurance on measurable processes and investment performance

Security Governance

Copyright 2004 - Above Security

Page 21: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 21

1. Implement information security policies

2. Risk Assessment

3. Develop a business continuity strategy

4. Configure proper network and system auditing

5. Deploy log centralization and analysis

6. Insure intrusion detection at all layers

7. Segment your network and reinforce access control

8. Manage your vulnerabilities

9. Conduct system security monitoring,

10. Get independent compliance audit and penetration testing

11. Security Awareness and Training

Information security recipe

Copyright 2004 - Above Security

Page 22: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 22

•Information Security Policies:- It is a management statement that information security is important

- It provide direction by establishing a set of clearly-articulated business rules to help people make decision when using or managing information assets

- It is uniquely tailored to your organization requirements and business processes

- It is a standard of due care that needs to be implemented no matter what industry your organization belongs

Ingredient #1

Copyright 2004 - Above Security

Page 23: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 23

It should minimally contain the following:1. Organizational security2. Asset classification and control3. Users, operators and management roles and

responsibilities4. System usage guidelines5. Physical and environmental security6. Communication and operations management7. Access control8. Systems development and maintenance9. Business continuity10. Compliance and measurement

Information Security Policies

Copyright 2004 - Above Security

Page 24: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 24

•Risk Management:

- Information security is not about technology, it’s about managing risk

- A vulnerability is a breach within a system (reliance on electricity, security hole, lack of control, physical exposure…)

- A threat is the actual event that can exploit a vulnerability (virus, electrical storm, hurricane…)

- A risk is the result of the combination of vulnerability and threat (outage = power failure cause by storm)

Ingredient #2

Copyright 2004 - Above Security

Page 25: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 25

Risk Management

Risk

Threat

Vulnerability

Risk = Volume of cube

Actual Risk

Asset Value

Threat

Vulnerability

Residual Risk

Asset Value

Copyright 2004 - Above Security

Page 26: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 26

•Business Continuity:- BC is the ability to maintain a constant availability of processes and information availability

- DR is the immediate and temporary restoration of computing and network operation within a defined timeframe after a disaster occurs

- Advanced planning and preparations are necessary to identify impact and potential losses and to establish a step by step approach to business resumption

- A plan is not a static document, it is a living strategy and an evolving process

Ingredient #3

Copyright 2004 - Above Security

Page 27: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 27

Cost of Downtimes

RevenueKnow your downtime

costs per hour,day, two days ...• Number of

employees affected x hours out x burdened hourly rate

Damaged Reputation• Customers• Suppliers• Financial markets• Banks• Business partners• ...

Financial Performance

Other Expenses• Temporary employees• Equipment rental• Overtime costs• Extra shipping costs• Travel expenses• Legal obligations ...

• Direct loss• Compensatory

payments• Future revenue losses• Billing losses• Investment losses

Productivity

• Revenue recognition• Cash flow• Lost discounts (A/P)• Payment guarantees• Credit rating• Stock price• …

Source: Gartner Group 2003

Copyright 2004 - Above Security

Page 28: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 28

•Network Security Monitoring:

- Technical equivalent to security governance- Corporation tends to neglect an holistic approach when protecting corporate assets

- Corporation normally focus solely on perimeter- Defense in depth the best risk mitigation approach- In brief, it is the combination of hardware, software, people and processes to monitor and respond to security incident

Ingredient #4

Copyright 2004 - Above Security

Page 29: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 29

Components to monitor

Components to be monitored

Server logs

Application logs

NetworkIDS

Host basedIDS

ApplicationBased IDS

Anti-Virus

Policy Compliance

Router & Switches Log

VulnerabilityManagement

Firewall &VPN Logs

Copyright 2004 - Above Security

Page 30: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 30

Steps for proper monitoring

Information CollectionCentralization and

standardization of theinformation

Alert NormalizationProcess

Event CorrelationProcess

Event PrioritizationProcess

InformationPresentation Process

Incident Handling

Intervention

Copyright 2004 - Above Security

Page 31: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 31

The MMI Infrastructure

Copyright 2004 - Above Security

Page 32: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 32

•Operating Systems: NT, 2000, 2003/XP, AIX, Solaris, HP, Linux, BSD, OS/400

•Networking: Cisco, Nortel, 3COM

•Firewall/VPN: MS ISA, Checkpoint, Cisco, Netscreen, Watchguard, Symantec

•IDS: Snort, Cisco, ISS, Enterasys, Tripwire, NFR, NAI, Symantec

•PKI/Strong authentication: RSA, Entrust, Microsoft

•Application servers: MS SQL, IIS, MS Exchange, Lotus Notes, Websphere, Oracle

•Application: Greatplains, Peoplesoft, SAP, Custom Web Based

Platforms to support

Copyright 2004 - Above Security

Page 33: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 33

Solutions

Copyright 2004 - Above Security

•Attack monitoring at all layers (network, server, application)

•Vulnerability management/change management for complex infrastructure

•Early warning system for potentially disastrous virus, vulnerability, worms…

•Pure event correlation (cause to effect analysis)

•Centralization, data reduction and analysis of your server logs

•24x7 monitoring by highly trained personnel

•Remote real time intervention

•Flexible real time escalation for sensible events

•Forensic

Page 34: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 34

•Compliance Audit and Testing:

-Last Step (confirm posture)- First Step (Business Case)

- Solid Methodology (not a sales pitch document !)

- What to look for :• External infrastructure• External application interfaces• Internal Intrusion• Internal vulnerabilities• Wireless• Social engineering• War Dialing

Ingredient #5

Copyright 2004 - Above Security

Page 35: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 35

•Security Awareness and training:

-Executiveslinked to business driversRegulations, obligations and risks

- ITVery technicalIncident analysisBuild a training plan

- End-UsersReal world examplesLink to their daily activities

Ingredient #6

Copyright 2004 - Above Security

Page 36: Confidential Document1 Speaker Robert Potvin, CISSP & CBCP 15 years of IT Security Experience Senior Consultant of Above Security Operations in Montreal,

Confidential Document 36

Thanks for attending !

Web: www.abovesecurity.com

E-mail: [email protected]

HQ Phone: (450) 430-8166

Questions?

Please visit us at our booth !