26
Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering Information Classification: [Public]

Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Embed Size (px)

Citation preview

Page 1: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Tamas FolnagySept 17, 2015

Cyber(r)evolution Advanced network defense strategies in high profile environments

Citi Architecture and Technology Engineering

Information Classification: [Public]

Page 2: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Agenda

1. Landscape – who and why ?

2. Looking back (...the old times...)

3. What’s out there today ?

4. Plan ahead...the future !

5. Remarks

Page 3: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Ready?

Page 4: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Introduction

tamas@box ~> whoamiTamas Folnagy

Engineering Lead, Global Network Perimeter Engineering, CATE CitiSecure

„Playing” with computers since early age

Large Scale Complex Enterprise Security

• Small but effective group• Large organization• Constant interesting challenges• Engineering solutions

Page 5: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Land(e)scape ?

Security Breach and Issues• On a daily basis• Big players

Information Sharing• Yes!• Large Scale Media Coverage• „Parent” factor

Dawn...

• Are we there yet?• We already passed.

Page 6: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Motivation – a „small” not comprehensive list

Financial gain• Direct profit• Fraud• „Sell” high value assets• Extortion

Information leak / technical advancements• Industrial espionage• Map and entrance to „others”• Win the game

Passion, tension, hobby• Proof of concept• Doomsday• Something new• „Friends” for the win!

Others• ...and beyond imagination (not!)

Group of Activists

Sharing a common belief, and using the cyberspace as extra

means for their cause.

State Driven

Unlimited Resources and Manpower, extensive skillset.

Cyber Underground

Financial gain is the motivation, resources and skillsets (as money allows)

Individuals

Training, Extra Skillsets, Limited on resources however

clever tactics

Page 7: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Response?

Page 8: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

On a diagram

Multiple Entry Points• Defend each• Each is a „risk”• Assuming knowledge

Page 9: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

The past and present

Page 10: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

The medieval defenses still work (to a point...)

Fort BourtangeStar fortress, Groningen, Netherlands

Fortified City of NaardenNetherlands

Page 11: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Changing perimeter – from the 90’s to the present

Basic Principles• Defend the web!

─ Access Control Lists

─ Server tuning (?!)

• Basic Firewall(s)

• Not so basic Firewalls(s)

• Appl. Awareness (1994)

• Perimeter shall do it all

• Early IDS systems

• Snort (1998)

• Limited Segmentation

• Cryptography

• IPsec

• PKI

Advancements• Defend the perimeter

─ Advanced Firewalls (NGFW)

─ Advanced IPS/IDS

• Robust Application Recogn.

• Hardware design and horsepower

• Decrypt / Encrypt

• Complex Protocols

• VoIP

• DCE-RPC

• Citrix

• Digital „Boom”

• Serious Business on the NET

• DoS / DDoS

Page 12: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Moore’s law? (More processing more power?)

Transistor counts• Doubling every 2 year• (Slight decrease in 2015)

More horsepower• Increased protection (UTM)• Processing• Modeling / Forecast

It has its „downsides”• Rise in vulnerabilites• Fuzzy capacity• Mathematical Breakthrough• Bruteforce

Page 13: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

The changed world

13

• Financial Industry

─ Online banking

─ E-trading

• Payment Providers

• E-wallets

• Fast & Easy

• Web of trust in banking

• Intl. Transfers

• Critical Infrastructure

• SCADA

• Building management

• Offshoring / Outsourcing

• Virtualization

• Simplicity

• Home Systems

─ Media Players / Routers

─ Digital House Management

• Streaming Media Services

• Online Music Library

• E-commerce

• Friends

• Social Media Platforms

• File and Content Sharing

• Media Agencies

• Publishing

• E-mail

• Communication channels

Secure our „home”

Secure our financials

Page 14: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Break the chain (at any point)

Page 15: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Cyber Kill Chain (Has some focus on perimeter)Famous Lockheed Martin

• Port Scans, Search for user addresses (e-mail), Social Networks, Reconnaissance

• Creating a malware, or develop exploit with payloadWeaponization

• Direct Links via e-mail, Spear Phishing, WebSite, Social Media Direct Link, SMS MessageDelivery

• Activate the delivered malware or code. Exploitation

• Escalate Privileges, Deploy Rootkit, Establish persistenceInstallation

• Establish C&C channel, ensure remote control is in place, start reconnaissanceCommand & Control

• Exfiltrate Data, Constant Persistence and Surveillance, Expand footholdAction on Target

Page 16: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

A disrupt, detect or break the chain to save the „day”(Deceiption works too)

Reconnaisance

Weaponization

Delivery

ExploitationInstallation

C&C

Actions on Target

Firewall

IPS

AV / OS

IDS / PATCHHIDS / AV

FW / IPS

FW / IPS

Page 17: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

A „simple” network perspective

Perimeter• ACL• Firewall• IDS/IPS• Proxy

Critical Assets• IDS/ADS• Patching / Vuln. Mgmt.• OS. hardening

Page 18: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

The more complex, the better, not just perimeter

Focus• Perimeter• Internal• High profile• Every-where!

Page 19: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

If all works – feel the harmonyIf all works – feel the harmony

Page 20: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Are we paranoid? Not really.

2006

2007

2008

2009

2010

2011

2012

2013

2014

0

1000

2000

3000

4000

5000

6000

7000

8000

Vulnerability0-dayBrowser

Source: Symantec

Page 21: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Rise in malware

2013 1H 2013 2H 2014 1H 2014 2H 2015 1H0

20000000

40000000

60000000

80000000

100000000

120000000

MalwareMobileSuspect URL

Source: McAfee Labs

Page 22: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

How about individual services?

Online Banking• Direct Attacks• Fraud• Vulnerability detection• DoS / DDoS• Anomaly Detection• Intrusion Detection• Aggregated logging

Detecting abnormal behaviour is key• Digital fingerprint• Normal vs abnormal• Wire-transfer vs. Account status• Machine Learning, Mathematical Algorithms

Page 23: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Internal segmentation and monitoring

Separate high profile• Shall not have direct exposure to internal• Tighter controls• Runbook

Segment networks – if possible• No mixing of services• Relief during break-out

Security Event Management Systems• Aggregate and correlate all system logs• Perform data analytics• Needle in the haystack

Mobile / BYOD Security• It’s a vector too!• Don’t let malware sneak in

Page 24: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Will never stop

Advancements in technology• Use at your best• Multiple layers• Exercises

Co-operate• Information sharing is key• Intelligence gathering and sources

Keep working on• Innovations, new ideas• Industry best practices• R&D...

Page 25: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering

Thank you!

Page 26: Tamas Folnagy Sept 17, 2015 Cyber(r)evolution Advanced network defense strategies in high profile environments Citi Architecture and Technology Engineering