THE 20 CRITICAL CONTROLS: A SECURITY STRATEGY RANDY MARCHANY VA TECH IT SECURITY OFFICE 1 (C) MARCHANY 2011.

Slides:



Advertisements
Similar presentations
1 CHALLENGES Users growing and becoming more demanding –E-learning, electronic registration and other services –Require 24x7 access to learning materials.
Advertisements

Chapter 24 Quality Management.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Incident Response Managing Security at Microsoft Published: April 2004.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Automating Crosswalk between SP 800, 20 Critical Controls, and Australian Government.
SESSION ID: Continuous Monitoring with the 20 Critical Security Controls SPO1-W02 Wolfgang Kandek CTO.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 2.
Firewalls Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Telstra in Confidence Managing Security for our Mobile Technology.
The State of Security Management By Jim Reavis January 2003.
System and Network Security Practices COEN 351 E-Commerce Security.
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Building a Campus Dshield Randy Marchany IT Security Lab VA Tech Blacksburg, VA 24060
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
General Awareness Training
COEN 252 Computer Forensics
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operations Security Domain #9.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Note1 (Admi1) Overview of administering security.
Chapter 2 Securing Network Server and User Workstations.
Module 11: Designing Security for Network Perimeters.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Information Security tools for records managers Frank Rankin.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
WSU IT Risk Assessment Process
Cybersecurity - What’s Next? June 2017
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Security Standard: “reasonable security”
Secure Software Confidentiality Integrity Data Security Authentication
Cyber Protections: First Step, Risk Assessment
NYBA 2017 Technology, Compliance &
I have many checklists: how do I get started with cyber security?
Implementing and Auditing the Critical Controls
Building a Security Operations Center
12 STEPS TO A GDPR AWARE NETWORK
Cybersecurity Threat Assessment
16. Account Monitoring and Control
Test 3 review FTP & Cybersecurity
6. Application Software Security
Presentation transcript:

THE 20 CRITICAL CONTROLS: A SECURITY STRATEGY RANDY MARCHANY VA TECH IT SECURITY OFFICE 1 (C) MARCHANY 2011

WHO AM I? Been working in IT Security since 1992, working in IT for 38 years CISO at VA Tech 40K node network. dual stack IPV4, IPV6 network since 2006 Multi-national – Main campus (Blacksburg, VA), Remote campuses (Arlington, Norfolk, VA), Swiss, Indian, Egyptian campuses My IT Security Philosophy All Security is Local Empower the local IT staff The Business Process trumps the Security Process Learn the business process before imposing security requirements Restrictive security practices cause worse problems overall 2 (C) MARCHANY 2011

3

MOST COMMON SECURITY MISTAKES MADE BY INDIVIDUALS (2001) Poor password management Leaving your computer on, unattended Opening attachments from strangers Not installing anti-virus software Laptops on the loose Blabber mounts Plug and Play without protection Not reporting security violations Always behind the times (OS, application patches) Keeping an eye out inside the organization 4 (C) MARCHANY 2011

WHAT I SAID: 1990’S – 2000’S “Viruses, trojans and worms will never be eliminated. There is a multi-billion $ industry built to contain them.” - RCM 2002 There’s no economic incentive to eliminate the root causes of cybersecurity issues. We have created a cyber-security industrial complex Eisenhower was right. 5 (C) MARCHANY 2011

VT CYBER SECURITY STRATEGY University has 3 main business processes  Academic, Administrative, Research Academic  Open access needed – THE ISP MODEL Administrative  Traditional corporate security model Research  Hybrid  Open access  Restricted research, e.g. ITAR 6

VA TECH IT SECURITY STRATEGY Based on ISO 27002, NIST Standards BYOD  All students required to purchase their own computers, bring their own smartphones. We’ve been doing this since 1984 Protect sensitive data regardless of location Business process defines and trumps the security process if there is a conflict IT and Business processes must adapt to new situation Don’t care what comes in the net. Worry about what leaves the net. (C) MARCHANY

IMPLEMENTING THE 20 CRITICAL CONTROLS STRATEGY Quick wins Focus on the most common and damaging threats Consistent implementation Metrics to justify acquisitions Interfere with Attackers getting in Attackers staying in Attackers causing damage Focus on what leaves the net rather than what comes in (C) MARCHANY

9

WHY 20 CRITICAL CONTROLS? Subset of the Priority 1 items in NIST Mapping of > >20 Critical Controls Technical controls only, not operational controls Have to start somewhere Focus is ASSURANCE not compliance! (C) MARCHANY

THE 20 CRITICAL CONTROLS: Inventory of authorized and unauthorized devices Reduce the ability of attackers to find and exploit unauthorized and unprotected systems: Use active monitoring and configuration management to maintain an up-to-date inventory 2. Inventory of authorized and unauthorized software Identify vulnerable or malicious software to mitigate or root out attacks: Devise a list of authorized software for each type of system, and deploy tools to track software installed (including type, version, and patches) 3. Secure configurations for hardware and software on laptops, workstations, and servers Prevent attackers from exploiting services and settings that allow easy access through networks and browsers: Build a secure image that is used for all new systems deployed to the enterprise (C) MARCHANY

THE 20 CRITICAL CONTROLS: Continuous Vulnerability Assessment and Remediation Proactively identify and repair software vulnerabilities reported by security researchers or vendors: Regularly run automated vulnerability scanning tools against all systems and quickly remediate any vulnerabilities 5. Malware Defenses Block malicious code from tampering with system settings or contents, capturing sensitive data, or spreading (C) MARCHANY

THE 20 CRITICAL CONTROLS: Application Software Security Neutralize vulnerabilities in web-based and other application software: Vendor Application Security Questionnaire 7. Wireless Device Control Protect the security perimeter against unauthorized wireless access: Allow wireless devices to connect to the network only if it matches an authorized configuration and security profile and has a documented owner and defined business need. 8. Data Recovery Capability (validated manually) 9. Security Skills Assessment and Appropriate Training To Fill Gaps (validated manually) 10. Secure configurations for network devices such as firewalls, routers, and switches Preclude electronic holes from forming at connection points with the Internet, other organizations, and internal network segments: Compare firewall, router, and switch configurations against standards for each type of network device. (C) MARCHANY

THE 20 CRITICAL CONTROLS: Limitation and Control of Network Ports, Protocols, and Services Allow remote access only to legitimate users and services: Apply host-based firewalls and port-filtering and scanning tools to block traffic that is not explicitly allowed 12. Controlled Use of Administrative Privileges Protect and validate administrative accounts on desktops, laptops, and servers to prevent two common types of attack: 13. Boundary Defense Control the flow of traffic through network borders, and police content by looking for attacks and evidence of compromised machines: (C) MARCHANY

THE 20 CRITICAL CONTROLS: Maintenance, Monitoring and Analysis of Audit Logs Use detailed logs to identify and uncover the details of an attack, including the location, malicious software deployed, and activity on victim machines:. Store logs on dedicated servers, and run biweekly reports to identify and document anomalies. 15. Controlled Access Based On Need to Know Prevent attackers from gaining access to highly sensitive data: Carefully identify and separate critical data from information that is readily available to internal network users. Establish a multilevel data classification scheme based on the impact of any data exposure, and ensure that only authenticated users have access to nonpublic data and files. (C) MARCHANY

THE 20 CRITICAL CONTROLS: Account Monitoring and Control Keep attackers from impersonating legitimate users: Review all system accounts and disable any that are not associated with a business process and owner. 17. Data Loss Prevention Stop unauthorized transfer of sensitive data through network attacks and physical theft: Scrutinize the movement of data across network boundaries, both electronically and physically, to minimize the exposure to attackers. 18. Incident Response Capability (validated manually) 19. Secure Network Engineering (validated manually) Keep poor network design from enabling attackers: Use a robust, secure network engineering process to prevent security controls from being circumvented. Allow rapid deployment of new access controls to quickly deflect attacks. 20. Penetration Tests and Red Team Exercises (validated manually) (C) MARCHANY

IMPLEMENTATION TIPS Secure upper management backing Do a 20 Critical Controls Gap Analysis Find out who at your organization has the information needed by a particular control Get access to the info Pick 2-4 controls at a time, Rinse, lather and repeat This is a 3-5 year project. (C) MARCHANY

YOU HAVE THE ANSWERS ALREADY 1. Inventory of authorized and unauthorized device Obtain from your network management group 2. Inventory of authorized and unauthorized software Obtain from software purchasing group 3. Secure configurations for hardware and software on laptops, workstations, and servers Policy 4. Continuous Vulnerability Assessment and Remediation IT Security Office runs weekly scans against critical servers 5. Malware Defense IT Security Office (C) MARCHANY

YOU HAVE THE ANSWERS ALREADY 6. Application Software Security Security Questionnaires 7. Wireless Device Control Network management group 8. Data Recovery Capability (validated manually) Network Backup service, departmental backup process 9. Security Skills Assessment & Appropriate Training To Fill Gaps (validate manually) Secure the Human 10. Secure configurations for network devices such as firewalls, routers, and switches Network Management Group (C) MARCHANY

YOU HAVE THE ANSWERS ALREADY 11. Limitation and Control of Network Ports, Protocols, and Services Policy, Standards, Individual Departmental guidelines 12. Controlled Use of Administrative Privileges Policy, Standards, Individual Departmental guidelines 13. Boundary Defense Policy, Standards, define the boundary! 14. Maintenance, Monitoring and Analysis of Audit Logs Standard Sysadmin practice, SIEM, Syslog server 15. Controlled Access Based On Need to Know Business process rules, Identity Mgt process (C) MARCHANY

YOU HAVE THE ANSWERS ALREADY 16. Account Monitoring and Control HR Policies/process, Identity Mgt process 17. Data Loss Prevention Sensitive Data protection policy/standards, network forensics 18. Incident Response Capability (validated manually) IT Security Office, Upper Mgt approval 19. Secure Network Engineering (validated manually) Network mgt group configuration rules 20. Penetration Tests and Red Team Exercises (validated manually) (C) MARCHANY

CONTROL ENTITY RELATIONSHIP DIAGRAM (ERD) #1

CONTROL ENTITY RELATIONSHIP DIAGRAM (ERD) #14

(C) MARCHANY

(C) MARCHANY

(C) MARCHANY

THE CHALLENGES Getting upper management (Board, President, CIO, VP) support Getting the data Internal IT groups may not have the info in a format you want Internal IT groups may not want to give you the data Departmental groups may not want to give you the info Performing the Gap analysis Building the 20 Critical Implementation plan Just doing it! (C) MARCHANY

JUST DO IT You probably rolled your eyes when you read the controls We can’t do that! It’s too complicated Just do it We have not made significant strides in overall organizational IT security in the past 20 years Same vectors in the 1990s are causing problems in the 2010s It’s time to change the paradigm Just do it – a few steps at a time (C) MARCHANY

QUESTIONS? Contact Information Randy Marchany University IT Security Officer VA Tech IT Security Office & Lab 1300 Torgersen Hall Blacksburg, VA (office) (lab) Blog: randymarchany.blogspot.com (C) MARCHANY