16
kpmg.com Moving from reactionary defense to proactive, automatic enterprise cyber defense A 2019 concept brief Evolving to prosilience

Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

kpmg.com

Moving from reactionary defense to proactive, automatic enterprise cyber defense

A 2019 concept brief

Evolving to prosilience

Page 2: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

1 “Moving Beyond Resilience to Prosilience,” Summer Fowler, Carnegie Mellon University, Software Engineering Institute, February 27, 2017

Executive summaryOur adversaries hold the “upper hand.” There aren’t enough qualified cyber individuals and resources to successfully protect the enterprise. Organizations are constantly playing “catch-up,” and reactive responses do not adequately address the threat. The playing field needs to change by evolving defense from reactive to proactive resilience: Prosilience.

Prosilience is “cyber resilience with consciousness of environment self-awareness and the capacity to evolve automatically”.1 KPMG’s Prosilience Reference Architecture incorporates new disruptive techniques in concert with preemptive threat intelligence to build the foundation for intelligent automation and cyber convergence. Prosilience delivers a powerful, cyber resilient enterprise that facilitates optimal mission outcomes.

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

Page 3: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

Deploying prosilienceKPMG’s Prosilience Reference Architecture (Figure 1) consists of three phases, each of which incorporate two technology elements:

Figure 1: Prosilience Reference Architecture steps

Phase 1 Define the enterprise baseline using a smart baselining (SB) approach

— Real-time situational awareness

— Advanced adversary pursuit (aka Intelligent Hunting)

Phase 2Automatically protect the enterprise

— Automatic zero-day and unpatched applications protection

— Actionable predictive threat intelligence

Phase 3Automate response and remediation

— Security orchestration, automation, and response

— Automation of actionable information

Deployment of prosilience entails two distinct dimensions:

— Technology/Capability integration: Enabling the tools to work together in the context of the enterprise environment

— Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively operate the integrated prosilience capabilities

2

3

1

Phase 1Define the baseline

— Cyber situational awareness

— Adversary pursuit

Phase 2 Automatically protect the enterprise

— Auto protect

— Predictive threat intelligence

Phase 3 Automate response and remediation

— Security orchestration, automation, and response

— Automating actionable information

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

3Evolving to prosilience

Page 4: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

Phase 1 incorporates SB combined with Intelligent Hunting. SB moves the vulnerability paradigm from what is unknown to what is known (Figure 2).

Critical for Real Time SA is understanding how every device relates to one another. Many times devices with Cat 3 & 4 vulnerabilities are not mitigated due to time, cost or other factors as the ATO focus is on remediating Cat 1 & 2 vulnerabilities. Adversaries seek the Cat 3 & 4 devices to build an attack path, and that attack path in-and-of-itself

then becomes a Cat 1 vulnerability. (Figure X below). This is why it’s imperative to instantaneously and automatically have attack path visualization, model access flow, identify egregious pivot points and reachable targets.

Phase 1

The cyber vulnerability paradigm

From To

“I can map all the devices I know about in my infrastructure.”

“I know what every device does.”

“I have a long list of all my vulnerabilities.”

“I check compliance with security policies a few times per year.”

“I can detect a security breach very quickly.”

“I can discover every device that exists in my infrastructure.”

“I know how the devices relate to one another.”

“I can prioritize vulnerabilities based on actual risk and total impact.”

“I know my security posture daily and can adjust accordingly and rapidly.”

“I must contain the security breach very quickly.

Figure 2: Moving the cyber vulnerability paradigm delivers improved, actionable, and real-time cyber situational awareness.

From To

2

3

1

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

Page 5: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

The next Phase 1 element is Intelligent Hunting. The average “dwell” time during which threats are present before they are discovered is 101 days.2 Intelligent Hunting is the art of deploying an advanced adversary pursuit methodology, using live memory analysis, that automatically identifies concealed threats residing in the uncontested conceded space. Why “uncontested”? The stealthy adversary knows these spaces are impervious to ordinary, traditional scanning tools—hence, uncontested. Intelligent Hunting complements SB by rapidly finding the hidden threats and, consequently, delivering an accurate, real-time, embedded threat situational-awareness picture.

Concealed threats are alive in your enterprise

WARNING

Egregious pivot point

Reachable Targets

Payload 1 Command & control

Payload 2

Firewall(stealth

tunnel built to extract data)

Dark Web

Router with Cat 4 Vul

Device with Cat 4 Vul

Device with Cat 4 Vul

Attack Path turns the Cat 4 vulnerabilities into a Cat 1 Attack Path vulnerability

P/W Database

PII Database

Proprietary Data

2 “EMEA Attack Dwell Time Hits 175 Days,” Phil Muncaster, Info Security Magazine, April 4, 2018.

Phase 1, cont.

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

5Evolving to prosilience

Page 6: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

Phase 2 provides the ability to automatically protect the enterprise by combining automatic zero-day and unpatched applications protection with actionable predictive threat intelligence. Applications tend to be some of the most

vulnerable, if not the most vulnerable, of all elements in an enterprise (Figure 4). Cracks in the Defense in Depth (DiD) Application Layer present the most sought-after entry point.

Phase 2

Figure 4: Cracks in the application security layer present the most sought-after entry point.

Payload

Data security

Application security

Endpoint security

Network security

Perimeter security

External Threatcan tunnel and exploit without detection through even the best perimeter, network and endpoint security

Internal ThreatAlready inside, has

access and trust

Guardrail protects applications regardless of vulnerabilities.

Guardrail

Payload

Data security

Application securityDENIED

Endpoint security

Network security

Perimeter security

External Threatcan tunnel and exploit without detection through even the best perimeter, network and endpoint security

Internal ThreatAlready inside, has

access and trust

2

3

1

2 “EMEA Attack Dwell Time Hits 175 Days,” Phil Muncaster, Info Security Magazine, April 4, 2018.

3 Zero-Day attacks take advantage of the never-seen-before vulnerabilities that are found in-the-wild.

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

Page 7: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

Phase 2 incorporates a “guardrail” methodology, which focuses on application code, not attacker techniques, to automatically protect the Enterprise (Figure 5). This methodology secures the application stack through its full lifecycle, from disk-to-processes-to-CPU memory, with protection kicking in within milliseconds. Most importantly, guardrail binary code methodology detects attacks at the memory level and only enables developer’s application code to execute, not the attacker’s malware, so zero-day attacks are rendered impotent. Also, since attacker intent is stopped instantly, unpatched applications are now fully protected, which negates the risk of falling behind with the latest application patches/updates.

The guardrail methodology further protects applications and critical infrastructure from advanced fileless4 and memory-based attacks that bypass conventional security, and it protects against WRT malware. This approach effectively detects and precisely addresses threats that attack at the memory level during runtime. It is not dependent on the policies, whitelisting, or rules and tuning requirements that characterize previous generations of protection.

Figure 5: Malware always maps to CPU memory differently compared to approved applications; Guardrail only allows acceptable applications to be processed; all malware, regardless of type, is immediately recognized, stopped and recorded.

4 “What is a Fileless attack?”, Maria Korolov, CSO Magazine, Oct 9, 2017, see https://bit.ly/2JPszR6

Conventional MalwareMalicious executable from

attacker sent to victim

Fileless MalwareMalicious script from attacker targets legit executables in victim

Weaponized at Runtime (WRT)

MalwareVictim App converts data from attacker

into malicious code in memory at runtime

Mem

ory

ad

dre

ss

Executables

FUNCTION

4c

4b

4a

FUNCTION

FUNCTION

Application Path

Malware Path

1 2 3 4

1d

1c

1b

1a

2e

2d

2c

2b

2a

3b

3a

FUNCTION

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

7Evolving to prosilience

Page 8: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

Phase 2 also exploits the “shadow infrastructure,” which is the hidden infrastructure where adversaries stage and test their attack code before launch. The end result is Actionable Predictive Threat Intelligence (APTI)—a new, better early-warning system of threat intelligence (Figure 6). This is accomplished by leveraging existing, deployed sensors and other “tools” that autodetect the buildup of

cyberattack infrastructures during their creation and deliver a better “anticipated threat” picture. When combined with a predictive algorithm, the result is an APTI capability that enables cyber defenders to “get ahead” of threats that have yet to materialize.

Combining APTI with the guardrail methodology results in robust, automatic threat protection for an enterprise.

The prediction difference — Prediction accuracy

– Classifier Accuracy: 97 percent

– False-Positive Rate: 0.007 percent

— Forward-deployed visibility

Fifty-one-day average prediction before attack launch

– Eight-to nine-week average for phishing, proxy, and botnet attacks

– Twelve-week average for malware, spam, and scanners

Predict

51+Day Predictions

PredictIP and CIDR Predictions attack group identified category predictions

Classify Labeling

Cluster Attribution

ExtractEntropy, temporal and statistical features

Malware Sandboxes Honeypots Intel Feeds

OSINT DNS Sinkholes Spam Traps

Enrich

Daily Updates

97% Accurate

<.01% FPs

Prediction context

Value

Prevent Attacks

High FidelityPivots CERT, SOC,

InfoSec Teams

Phase 2, cont.2

3

1

Hunt

Daily

DNS

WhoisIPv4

IPv6

BGP

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

Page 9: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

9Evolving to prosilience

Page 10: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

SOAR automation reduces alert resolution from minutes to seconds.

SIEM sends UEBA alert on suspicious

account activity

Quarantine other affected hosts

Search SIEM for other hosts that have

communicated with URL

Quarantine host

Disable user account in AD

Close incident

Close incident

Suspicious URL identified in

underlying data

Search threat intel for URL

URL is known bad, benign, or

unknown

Add user account to SIEM watch list for closer monitoring

Open tickets for IT to

clean hosts

Automation (playbook) Manual process

Assign to analyst for additional Investigation

Time to resolution can take anywhere between 11 to 26 seconds for each alert.

Benign

Known bad

Unknown

1–3 min

2–5 min

1–3 min 1 min

2–5 min 3 min

1–3 min 2 min 1–3 min

1 min

2–5 min

1 sec

4 sec

4 sec 1 sec

5 sec 3 sec

3 sec 5 sec

1 sec

2 sec

1 sec

4 sec 3 min

Figure 7: Example of alert/remediation time reduction moving from manual process to SOAR automation

Phase 3 provides automated response and remediation by combining Security Orchestration, Automation, Response (SOAR) with capabilities that automate actionable information. SOAR combines processes and tools working in concert to automate otherwise disparate, tedious, time-consuming security tasks. SOAR quickly discerns the

criticality and legitimacy of an alert, understands context and takes corresponding corrective actions, and initiates automatic remediation. SOAR’s primary benefit is moving alert detection and remediation from minutes/hours to seconds, thereby significantly reducing cost per alert and increasing resilience (Figure 7).

Phase 32

3

1

Time to resolution can take anywhere between 19 and 37 minutes for each alert.

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

Page 11: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

Phase 3 also incorporates automating the extraction and correlation of actionable threat information. There is a mountain of excellent, actionable data available via commercial and government threat reports (Figure 8). The challenge is trying to keep up with the sheer volume of reports—typically more than 5,800 per month, with 195 unique, unstructured formats identifying more than 9,500 threat indicators. In the face of this deluge, the tasks of manual data collection, analysis, and correlation are

overwhelming, and many reports are missed. The solution is to implement automation to reduce time-consuming review tasks and orchestrate a process to establish a shared knowledge base that captures actions throughout the automated reports review process. The result is a shift from manual extraction and correlations of actionable information to automating the data extraction process, which enhances the effectiveness of human watch standers (Figure 9).

Figure 8: Example of available cyber threat reports

NTOC IAD

JIMS

FBI Flash

NTOC ADV

NTOC IAD

NTOC IAD

NTOC CAR

NTOC ADV

Ars Technica

DCISE CRF

Contagio

DCISE TIP

PaloAlto

NTOC CAR

US-CERT Alert

DCNDC Tipper

iSight Partners

NTOC MALWR

NTOC MALWR

Arbor Networks

NTOC ICD

NTOC ICD

F-Secure

NSA Pulse

EUCOM JCC SR

Preventity

EUCOM JCC NAR

Symantec

FBI IIR

FireEye

DCNDC IR

Blue Coat

USDAO IIR

CrowdStrike

NCIS IIR

NAVY IIR

APT Groups

AFOSI IIR

CTAD FAR

Threat Post

CIA IIR

CTAD Bullentin

Proofpoint

CTAD MTIR

Clearsky

DTRA IIR

SecureWorks

CTAD FAR

Cylance

DCICE TAR

DHS Daily

Test Flight

DCISE CTAR

Trend Micro

iSpace

DHS IIR

Threat Expert

Others

DIA IIR

Threat Geek

DCNDC Malware

Malware Bytes

DCNDC FAR

Cisco Talos

EUCOM JCC FMA

CNMF Findings

Many others

Many others

Top secret network reports (1,400 per month average)

Secret network reports (4,400 per month average)

Unclassified network reports (2,100 per month average)

Cross- domain solution

Cross- domain solution

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

11Evolving to prosilience

Page 12: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

Attempts to manually understand and respond are ineffective

150 5800

Limited time spent Deciding and Acting

Phase 3, cont.2

3

1

Different sources producing cyber intelligence

Reports published every month

80%Majority of time spent manually

Observing and Orienting of analyst’s time spend manually collecting, copying, and pasting

2000 +

SensorsTasked with rules and producing cyber alerts

Unique formats of unstructured reports195

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

Page 13: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

Observe and Orient

Illuminate

Decide and Act

Enabled by Illuminate

Analyze intelligence information

Share malicious code or network data capturesMaintain adversay awareness

Share adversary actions

Prioritize Analysis

Assess Mission Readiness

Maintain and display system security state

Identify malicious network behavior

Create & Deploy Countermeasures

Generate risk mitigation recommendation

Activity DateWhen did it happen?

Attributed ActorWho performed the activity?

Attack PatternsCyber Kill Chain and NSCAR

Target/Victim OrganizationsWho did it happen to?

Malware Families/ToolsWhat malware or tools were used?

VulnerabilitiesWhat vulnerabilities were exploited?

IndicatorsMethod to discover related activity?

CountermeasuresWhat Mitigations are deployed?

Cyber Analysts now doing more productive DCO activities

Introduce automation to reduce time-consuming tasks, orchestrate processes to coordinate activities, and establish a shared knowledge base that captures actions throughout the process.

ObserveAutomate the discovery and collection of cyber intelligence and reports.

Act Orchestrate the creation, testing, and deployment of signatures to sensors.

Decide Orchestrate decision making and identify effective mitigations.

OrientAutomate the extraction and correlation of actionable information.

1 2 3 4

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

13Evolving to prosilience

Page 14: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

Putting it all together— The KPMG advantageThe persistent onslaught of threats requires organizations move at the “speed of cyber,” that is evolve from being reactive to proactive in their cyber defense. For this reason, KPMG developed the Prosilience Reference Architecture. Using the reference architecture, KPMG guides clients on how to achieve a prosilience foundation (Figure 10). Key to prosilience deployment is addressing two distinct dimensions:

— Technology/Capability integration: Making the tools work together and in the context of an enterprise environment

— Operational integration: Adjusting and deploying operational procedures and training a cyber workforce to effectively operate the integrated prosilience capabilities

The KPMG Maturity Approach first performs an assessment to determine where the enterprise stands in relationship to the Prosilience Reference Architecture elements. Some of the assessment queries include the following:

— Does the current cyber awareness include real-time graphic depiction of how devices relate to one another? Does it address access flow? Does it visualize all possible attack paths while identifying the egregious pivot points?

— If hunting is deployed, does the organization incorporate an advanced adversary pursuit methodology?

— How are applications protected?

— How is the organization protected against zero-day attacks?

— What is the level of predictive threat intelligence currently in place?

— Is Security Orchestration, Automation, and Response deployed?

— How does the organization analyze and correlate threat reports?

Upon assessment completion, we deliver our findings and a roadmap, including architecture and training/procedures recommendations needed to achieve a detailed prosilience foundation. We work closely with our clients to determine if there are existing elements that can be incorporated and/or “tweaked” to preserve existing capital investments whenever possible. We advise clients on the path toward achieving a capable cyber defense position within the constraints of operational requirements, federal regulations, budgets, and time.

The KPMG Advantage brings the experience to guide clients through integrating the six prosilience elements into a cohesive cyber architecture, in alignment with an organization’s operational and technical needs, while aiming to minimize disruption. KPMG succeeds when its clients achieve optimal mission outcomes in the most secure manner possible.

Figure 10: KPMG Maturity Approach

2

3

1Cyber

awareness

Adversary pursuit

SOAR

Automating actionable info

Auto protect

Predictive threat

intelligence

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

14

Page 15: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

KPMG has assisted federal, state, and local governments for more than 100 years. We possess the necessary knowledge, insight, and awareness of cybersecurity standards, legislation, and regulatory implications to address client needs. We help organizations transform their security functions into mission-enabling platforms so they can understand, prioritize, and manage cybersecurity risks; reduce uncertainty; increase agility; and convert risk into advantage.

About KPMG

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097

15Evolving to prosilience

Page 16: Evolving to prosilience - KPMG · enterprise environment — Operational integration: Adjusting and deploying operational procedures and training the cyber workforce to effectively

kpmg.com/socialmedia

Tony HubbardKPMG Government Cyber Security LeadT: 703-286-8320E: [email protected]

L. Barry Lyons IVDirector, Government Cyber Security ServicesT: 240-306-5555E: [email protected]

Contact us

© 2019 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 872097