26
Security Automation and Adaptive Cyber Defense Strategies for Success Borderless Cyber - October 8, 2019 Donnie W. Wendt 1 Experiences from the Financial Sector

Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Security Automation and Adaptive Cyber Defense Strategies for Success

Borderless Cyber - October 8, 2019

Donnie W. Wendt

1

Experiences from the Financial Sector

Page 2: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

We are surrounded.

Good!

Now we can fire in any direction!

2

Chesty Puller, USMC

Page 3: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Donnie WendtWho Is This Guy?

• Security Engineer with MasterCard

• Cybersecurity Professor at Utica College

• Certified Information Systems Security Professional (CISSP)

• MS Cybersecurity with Concentration in Intelligence

• Doctoral Candidate at Colorado Technical University

• Pursuing Doctor of Science – Computer Science - Emphasis in Information Security

• Dissertation – Security Automation and Adaptive Cyber Defense in Financial Services

• Interests – Playing guitar, scuba diving, running, and studying history

• LinkedIn - https://www.linkedin.com/in/donnie-wendt-b958a6120/

• Blog – https://www.showmecyber.com

3

Page 4: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Today’s Topics

The Driving Forces of Automation

Conceptual Framework

Research Overview

Discussion of Findings

Conclusions

4

Page 5: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Current StateAdvantage Attacker

• Attacker Enjoys an Asymmetric Advantage

• Exploit one vs. defend all

• Homogenous platforms and software

• Well-known static defenses

• Increased Sophistication of Attacks

• Highly motivated attackers

• Detection increasingly difficult

• The Need for Speed

• Human-centered defenses cannot keep pace

• Defenders must increase speed of detection and response

5

Page 6: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

The OODA LoopOften Referenced, Often Misunderstood

Gaining Air Superiority - Developed by Air Force pilot John Boyd

6

Common View As Drawn by Boyd

Page 7: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Conceptual FrameworkAddressing Both Sides of the Equation

7

Page 8: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Speeding Detection & ResponseContinuous Situational Awareness

• Situational awareness requires automation

• Automated enrichment

• Improves situational awareness

• Human on the loop

• Discernment and decision making

• Improving intelligence sharing

• Decreases attacker’s asymmetric advantage (less exploit reuse)

• Decreases detection and response times

• Reluctance and concerns

8

Page 9: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Slowing the AttackerDeception and Adaptive Defenses

• Boyd focused on getting inside the attacker’s loop

• Compromise the opponent’s decision-making ability

• Deceive humans

• Manipulate data streams

• Disrupt the opponent’s orientation

• Consume the opponent’s resources

• Improve your own situational awareness

• Knowledge of opponent

9

Page 10: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Research Overview

• Problem

• Need strategies to improve automation and adaptive defenses within financial sector

• Cyber Defenders at a Disadvantage

• Gap in Knowledge

• Necessity of security automation and ACD

• Adoption within the financial sector has not been studied adequately

• Significance

• Increase the security posture of the financial services industry

• Justify future investments

• Improve adoption

10

Page 11: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Research Participants

11

Page 12: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Findings

• Six Research Themes Emerged

• Use of automation in security operations

• Benefits of security automation

• Requirements for successful security automation

• Use of intelligence sharing in security operations

• Minimal use of deception and automated response

• Impediments to effective intelligence sharing

12

Page 13: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

• Event enrichment and correlation

• Intelligence processing

• Automated responses

• Detection and prevention

13

Theme 1Use of Automation in Security Operations

“Gather incident context at a sub-second level, to bettercontextualize the incident … previously that was being done manually

and taking minutes, if not hours, to build that whole context out.”

“Investigating phishing is a consistent amount of repetitive busyworkthat allows for straightforward construction of playbooks.”

Page 14: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Theme 2Benefits of Security Automation

• Time savings and efficiency gains

• Free analysts for more advanced work

• Increased visibility and decreased time to detect

• Process consistency

14

“Now we can have guys focusing more on the human aspects of automation.”

“Automation also standardizes the way that analysts do investigations, making it easier to learn and to review.”

Page 15: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Theme 3Requirements for Successful Automation

• Begin with use cases within the team’s control

• Build organizational trust

• Focus on quick wins

• Well-defined processes

15

“Make sure that our processes aren't broken; if you orchestrate a broken process you're just doing dumb stuff faster.”

“It's easy to say we're going to automate some of the things in our own realm, but the moment we step into other people's areas, that can be a hot button.”

Page 16: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Theme 4Minimal Use of Deception and Response

• Deception use cases not implemented

• Rudimentary automated response

• Strong interest to increase usage

• Undo incorrect actions

16

“We have some thoughts around the deception space…but we haven't reallyimplemented it.”

“You have to be very careful when you first put automated responses in because…if you mess up once you destroy your chances, probably forever.”

Page 17: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Theme 5Intelligence Sharing in Security Operations

• Active participation

• Automation focused on ingestion and enrichment

• Filter indicators of compromise (IOCs)

• Enrich IOCs

17

“The ability to share within this industry…is the greatest way for us to protect the industry.”

Page 18: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Theme 6Impediments to Effective Intel Sharing

• Concerns with intelligence feeds

• Reluctance to share

18

“The challenge is do I have real time threat intelligence that I can action on right now ”

“There is still huge concern in many regulated entities that when they share with the government, that the arm of the government that regulates them will

use that against them .”

Page 19: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Conclusions

• Many Use Cases and Significant Benefits

• Implementation Requires Careful Planning

• Need to Improve Intelligence Sharing

• Increase Automated Response and Deception

19

Page 20: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Conclusions

• What are the strategies cybersecurity specialists need to improve adaptive cyber defenses within the United States financial sector?

• Focus on quick wins

• Use automation to mitigate intelligence sharing concerns

• Build organizational trust

• Increase automated response after building trust

20

“If you are not getting some early wins and getting some real value, you start losing the hearts and minds.”

Page 21: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Simplified IOC Ingestion Example

21

Page 22: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Future Research

• Case Study - Fully-Implemented

• Other industries - Healthcare

• Similar Study in 2 Years

• Evaluate and Quantify Performance of Security Automation Platforms

22

Page 23: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Acknowledgements

• Faculty and Staff of CTU

• Research Supervisor and Mentor – Dr. Alexa Schmitt

• Research Committee – Dr. James Cox & Dr. Deborah Telfer

• Research Participants

• Mastercard

• Johns Hopkins University Applied Physics Lab

• Borderless Cyber

23

Page 24: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Further Reading & SourcesAl-Ibrahim, O., Mohaisen, A., Kamhoua, C., Kwait, K., & Nijila, L. (2017). Beyond free riding: Quality of indicators for

assessing participation in information sharing for threat intelligence. arXiv:1702.00552, 1-12. doi:10.1145/1235

Almeshekah, M. H., & Spafford, E. H. (2016). Cyber Security Deception. In S. Jajodia, V. Subrahmanian, V. Swarup, & C. Wang (Eds.), Cyber Deception (pp. 23-50). Switzerland: Springer. doi:10.1007/978-3-319-32699-3_2

Boyd, J. R. (1986). Patterns of conflict. Retrieved from http://dnipogo.org/john-r-boyd/

Boyd, J. R. (1996). The essence of winning and losing. (C. Spinney, C. Richards, & G. Richards, Eds.) Retrieved from http://dnipogo.org/john-r-boyd/

Carter, K. M., Okhravi, H., & Riordan, J. (2014). Quantitative analysis of active cyber defenses based on temporal platform diversity. OALib Journal. Retrieved from http://arxiv.org/abs/1401.8255v1

Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701-715. doi:10.1007/s11948-014-9551-y

De Faveri, C., & Moreira, A. (2018). A SPL framework for adaptive deception-based defense. 51st Hawaii International Conference on System Sciences, (pp. 5542-5551). Honolulu, HI. doi:10.24251/HICSS.2018.691

Dewar, R. S. (2017). Active cyber defense: Cyber defense trend analysis. Zurich, Switzerland: ETH Zurich.

Fonash, P. (2012). Identifying cyber ecosystem security capabilities. CrossTalk (September/October), 15-22.

Fonash, P., & Schneck, P. (2015, January). Cybersecurity: From months to milliseconds. Computer, 42-50. doi:10.1109/MC.2015.11

24

Page 25: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Further Reading & SourcesJohns Hopkins Applied Physics Laboratory. (2016). Integrated Adaptive Cyber Defense (IACD) Baseline Reference

Architecture. Laurel, MD: Johns Hopkins Applied Physics Laboratory. Retrieved from https://secwww.jhuapl.edu

Johns Hopkins Applied Physics Laboratory. (2017). Integrated Adaptive Cyber Defense (IACD) Orchestration Thin Specification. Laurel, MD: Johns Hopkins Applied Physics Laboratory. Retrieved from https://secwww.jhuapl.edu

Kampanakis, P. (2014). Security automation and threat information-sharing options. IEEE Security & Privacy(September/October), 42-51. Retrieved from www.computer.org/security

Okhravi, H., Streilein, W. W., & Bauer, K. S. (2016). Moving target techniques: Leveraging uncertainty for cyber defense. Lincoln Laboratory Journal, 22(1), 100-109.

Olagunju, A. O., & Samu, F. (2016). In search of effective honeypot and honeynet systems for real-time intrusion detection and prevention. Proceedings of the 5th Annual Conference on Research in Information Technology (pp. 41-46). Boston, MA: ACM. doi:10.1145/2978178.2978184

Rauti, S., & Leppanen, V. (2017). A survey on fake entities as a method to detect and monitor malicious activity. (pp. 386-390). St. Petersburg, Russia: IEEE. doi:10.1109/PDP.2017.34Euromicro International Conference on Parallel, Distributed and Network-Based Processing

Raymond, D., Conti, G., Cross, T., & Nowatkowski, M. (2014). Key terrain in cyberspace: Seeking the higher ground. 6th International Conference on Cyber Conflict (pp. 287-300). Tallinn, Estonia: NATO CCD COE Publications. doi:10.1109/CYCON.2014.6916409

Sillaber, C., Mussman, A., Sauerwein, C., & Breu, R. (2017). Data quality challenges and future research directions in threat intelligence sharing practice. ACM Workshop on Information Sharing. Vienna, Austria: ACM. doi:10.1145/2994539.2994546

25

Page 26: Security Automation and Adaptive Cyber Defense Strategies ... › ... › files › Wendt-day1.pdf · Theme 3 Requirements for Successful Automation • Begin with use cases within

Further Reading & SourcesTounsi, W., & Rais, H. (2018). A survey on technical threat intelligence in the age of sophisticated cyber attacks.

Computers & Security, 72, 212-233. doi:10.1016/j.cose.2017.09.001

Virvilis, N., Serrano, O. S., & Vanautgaerden, B. (2014). Changing the game: The art of deceiving sophisticated attackers. 6th International Conference on Cyber Conflict (pp. 87-97). Tallinn, Estonia: NATO CCD COE Publications. doi:10.1109/CYCON.2014.6916397

Wendt, D. (2019). Addressing both sides of the cybersecurity equation. CSIAC Journal, 7(2), Retrieved from: https://www.csiac.org/journal-article/addressing-both-sides-of-the-cybersecurity-equation/

Willett, K. D. (2015). Integrated adaptive cyberspace defense: Secure orchestration. International Command and Control Research Technology Symposium. Annapolis, MD. Retrieved from https://pdfs.semanticscholar.org/a228/81b8a046e7eab11acf647d530c2a3b03b762.pdf

Winterrose, Carter, K. M., Wagner, N., & Streilien, W. W. (2014). Adaptive attacker strategy development against moving target cyber defenses. ModSim World (pp. 1-11). Hampton, VA: ModSim World.

Zager, R., & Zager, J. (2017, October). OODA loops in cyberspace: A new cyber-defense model. Small Wars Journal.

Zheng, D. E., & Lewis, J. A. (2015). Cyber Threat Information Sharing: Recommendations for Congress and the Administration. Washington, DC: Center for Strategic & International Studies. Retrieved from https://www.csis.org/analysis/cyber-threat-information-sharing

26