Transcript 2007 ETM Presentation - ARN
Enterprise Threat Management (ETM): Bringing Security Together Through Intelligence
David Thomason
Director of Security Engineering
Look Familiar? The Agony of Today’s Network Security
Outsider Attacks
According to the 2006 Ponemon Data Breach Study, those surveyed who experienced data theft in the last year
spent an average of $660,000 to notify customers, business partners, and regulators.
Insider Accidental Attacks
In an FBI Computer Crime Survey released on 1/11/07,
44% of participants said they were attacked from within their own organizations.
2
X Unknown Connections
The most recent CSI/FBI Crime Computer and Security Survey reports that
66% of the security incidents that caused the greatest organizational losses were unauthorized access and theft of proprietary information. X X X Undetected Attacks
According to
ComputerWorld
Magazine, the TJX security breach, that was reported in mid-December of 2006 and
could put the credit and debit card data of more than 40 million customers at risk, was not detected for seven months.
X X Insider Malicious Attacks
In a survey jointly done by ASIS International and the U.S. Chamber of Commerce, 138 executives of Fortune 1000 companies reported
losses between $53 billion and $59 billion due to insider attacks.
X X X Compliance Enforcement
According to John Hagerty of AMR Research,
“…it [automated compliance] also comes down to an issue of visibility. Where do I have problems? Where do I have exposure? That’s when it starts to become a more strategic issue because management is asking for an overall view of this.”
Current Security Spending Trends: Unsustainable Growth
Security spending is dramatically growing as a percentage of the overall IT budget… In fact, it is growing twice as fast as overall IT spending (12% vs. 6%)… 17% 13% 11% 11% '03 '04 '05 '06
Source: 2006 CIO/CSO/PWC State of Info Security Survey 3
160,000 140,000 120,000 100,000 80,000 60,000 40,000 20,000 0 1995 1996 1997 1998 Incidents 1999 2000 2001 Security Software Revenue 2002 2003 $9,000 $8,000 $7,000 $6,000 $5,000 $4,000 $3,000 $2,000 $1,000 $0 Yet the threats and vulnerabilities keep coming!
4
What’s Going on Here?
The awareness of the problem is there Billions of dollars have been spent on IT security The security problem is getting worse as attackers become more motivated. Today’s professional hacker does not want his work to be noticed. The TJX security breach (T.J. Maxx stores) – disclosed in 12/06 – was one of the largest in retail history and
went undetected for seven months!
How is it possible for so many security technologies to be defeated?
The silo approach of “see a threat, buy a box” is no longer feasible.
5
Key Flaws in Current Network Security
Network security technology operates with
knowledge about what it’s protecting virtually no
“By the end of 2007,
75% of enterprises will be infected with undetected, financially motivated, targeted malware
Virtually all network security technology is
by people that evaded their traditional perimeter and host defenses.
driven solely
— financially motivated, targeted These factors combine to lead to
static
attacks are increasing, and automated malware-generation kits
network defenses that are misconfigured, porous, and
security processes and technologies haven't kept up
.”
Gartner's
Top Predictions for IT Organizations and users, 2007 and Beyond
Security Events Must Have Context
6
Is this guy a threat? Or a valued customer?
Is he holding a gun? Or an iPod?
Is it summer in Sydney? Or winter in New York?
Do you reach to set off the alarm? Or to shake his hand?
Unfortunately, the majority of network solutions today lack the ability to integrate intelligence into the real-time analysis of potential threats.
7
Introducing Enterprise Threat Management (ETM)
Intrusion Prevention Vulnerability Assessment Threat Endpoint Network Intelligence Network Behavior Analysis (NBA) Network Access Control (NAC)
8
The Role of Intrusion Prevention
Vulnerability-based Intrusion Prevention
• • First line of ETM defense IPS rules should address the “vulnerability”—not the “exploit” • • Protection against zero-day attacks IPS events should be correlated against endpoint intelligence • IPS is just one part of an effective ETM strategy
Protection Against
Worms Trojans Port scans Buffer overflow attacks Spyware Protocol anomalies Malformed traffic Invalid headers Zero-day attacks
9
The Role of Vulnerability Assessment
“Active” Endpoint Intelligence
• • Popular source for obtaining endpoint and vulnerability intelligence Provides a rich “snapshot” of endpoint assets and vulnerabilities • • Intelligence degrades in between active scans Active scanning can be “harmful” to some hosts
Scan occurs Accuracy decay
t - Coherence time t Time
10
The Role of Network Behavior Analysis (NBA)
“Passive” Endpoint Intelligence
• Compliments “rich” intelligence gained by active scanning • • 24x7 monitoring for endpoint assets and vulnerabilities Analogous to passive SONAR —learn by listening
Network Anomaly Detection
• • Create a baseline of “normal” network behavior Identify propagation of attacks that “walked” through the front door
11
The Role of Network Access Control (NAC)
Pre-connect NAC
• • Dominated by Cisco Network Admission Control (CNAC) & Microsoft Network Access Protection (MNAP) standards Useful for determining “who” can get on the ride
Post-connect NAC
• Useful for determining “what” you can do once you’re on the ride • Set compliance policies related to usage of operating systems, services, apps, resources, etc.
• Identifies policy and regulatory non compliance
12
Tying It All Together
Integrated ETM Console
• Monitor for security events originating from both inside and outside the organization • • • Correlate threat, endpoint, and network intelligence • • • Threat intelligence from IPS Endpoint intelligence from VA & NBA Network intelligence from NBA Drastically reduce false positives and negatives Monitor for compliance with IT policies related to company, industry and/or government regulatory compliance • Compliance monitoring through post-connect NAC
13
ETM —Before, During & After the Attack
BEFORE AN ATTACK Everything on the network Policy Violations and Vulnerabilities By Hardening Assets DURING AN ATTACK The Attack The Impact By Blocking and Alerting AFTER AN ATTACK Where the Attack Occurred What Action to Take By Minimizing the Impact
14
Sourcefire’s Approach to ETM
Sourcefire 3D System ™
BEFORE AN ATTACK DURING AN ATTACK
D I S C O V E R
The Attack AFTER AN ATTACK Everything on the network Where the Attack Occurred Policy Violations and Vulnerabilities
D E T E R M I N E
The Impact What Action to Take
D E F E N D
By Hardening Assets By Blocking and Alerting By Minimizing the Impact
“Providing endpoint and network intelligence to network security products significantly improves their capabilities...” INTELLIGENCE LAYER
Use Endpoint Intelligence to Improve Security Defenses
Report
ETM —a Better, More Efficient Process
15 Organizations need systems that can analyze security information and apply context
automatically
and
holistically
. Most security technologies are driven by a man-in-the loop process.
• How do you know when to update your access control configuration? • How do you know when a new vulnerability is relevant to your environment?
• How do you know when there is an active, high priority security event occurring in your environment?
• How do you know when the patch management system needs to address a new host?
• This information is then turned into response manually Persistent, automatic intelligence generation and analysis driving network security to:
REAL-TIME, UNIFIED, NETWORK DEFENSE
16
ETM Benefits Summary
Enjoy continuous protection through an integrated approach. The whole truly is greater than the sum of the parts —reduce number of vendors, reduce cost of ownership Get faster and more accurate response from threat, endpoint, and network intelligence —the keys to driving next-generation security technologies that are automated and adaptive Take advantage of consolidated reporting and management views Enforce compliance of security policies and industry regulations as part of overall network protection
17
ETM Take-away
ETM leverages real-time intelligence about the network environment and drives it into network security technologies for a more effective and efficient security solution.