Reduce your attack surface by getting back to basics

45
Do you really need more shiny security toys? Reduce your attack surface by getting back to basics Avishai Wool CTO

Transcript of Reduce your attack surface by getting back to basics

Page 1: Reduce your attack surface by getting back to basics

Do you really need more shiny security toys? Reduce your attack surface by getting back to basics

Avishai WoolCTO

Page 2: Reduce your attack surface by getting back to basics

AGENDA

1. Structure of an APT attack

2. Back to Basics: Reducing the Attack Surface

3. Network Segmentation and Security Zones

4. Managing Zoned Networks with AlgoSec

2 | Confidential

Page 3: Reduce your attack surface by getting back to basics

3 | Confidential

1. STRUCTURE OF AN APT ATTACK

Page 4: Reduce your attack surface by getting back to basics

4 | Confidential

Page 5: Reduce your attack surface by getting back to basics

5 | Confidential

HOW?

1. Repeat until desired data reached:

• Recon • Deliver exploits • Explore the network• Be persistent

2. Exfiltrate data

“Advanced Persistent Threat”, Wikipedia

Page 6: Reduce your attack surface by getting back to basics

INFORMATION GATHERING

1. OSINT (Open Source Intelligence)• Port scans, vulnerability scanning externally open services

2. On-site gathering

3. HUMINT (Key employees, social engineering)

4. Foot-printing • Banner grabbing, SNMP Sweeps, DNS zone transfers, etc

6 | Confidential

http://www.pentest-standard.org/index.php/Intelligence_Gathering

Page 7: Reduce your attack surface by getting back to basics

INFORMATION GATHERING: REQUIRES NETWORK TRAFFIC

1. OSINT (Open Source Intelligence)• Port scans, vulnerability scanning externally open services

2. On-site gathering

3. HUMINT (Key employees, social engineering)

4. Foot-printing • Banner grabbing, SNMP Sweeps, DNS zone transfers, etc.

7 | Confidential

Page 8: Reduce your attack surface by getting back to basics

ATTACK TECHNIQUES (PARTIAL LIST)

• Email attachment• Send a malicious email attachment

• Browser Drive-By-Download• Host the malicious content on a website

• “Water-hole” technique• Compromise a website the victim likely to visit

• Social Engineering• Fool someone to do it for you

• Mobile malware• Spread a malicious mobile application

8 | Confidential

Page 9: Reduce your attack surface by getting back to basics

EXPLORE THE COMPROMISED NETWORK

• Move Laterally• Find more devices

• Gain more access

• Find interesting data

Lateral movement relies on (unusual) network traffic

9 | Confidential

Page 10: Reduce your attack surface by getting back to basics

ATTACK PERSISTENCY

• Attacker needs to stay for the long term

• Users tend to: • Reboot, patch their systems, update signature detection

• Solution: Deploy software on victim’s machine

• Remote Administrator Tools (RAT) are the most popular• Poison Ivy , Dark Comet, Net Wire, ….

Attack persistency relies on (unusual) network traffic

10 | Confidential

Page 11: Reduce your attack surface by getting back to basics

EXFILTRATION

• Attacker needs to exfiltrate data from the network• Encrypted over SSL

• Blend in normal traffic over HTTP

• Picture, Social media posts, pastebin, HTML tags

• VoIP

• Unusual (outbound) traffic

11 | Confidential

Page 12: Reduce your attack surface by getting back to basics

STEPPING STONES

12 | Confidential

1

2

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

InternetStep 0

Page 13: Reduce your attack surface by getting back to basics

STEPPING STONES

13 | Confidential

1

3

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

InternetStep 0

Step 1

Page 14: Reduce your attack surface by getting back to basics

STEPPING STONES

14 | Confidential

1

4

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

InternetStep 0

Step 1 Step 2 Step 3

Page 15: Reduce your attack surface by getting back to basics

STEPPING STONES

15 | Confidential

1

5

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

InternetStep 0

Step 1 Step 2 Step 3

Step 4 – exfiltrationGame Over

Page 16: Reduce your attack surface by getting back to basics

16 | Confidential

2. BACK TO BASICS: REDUCING THE ATTACK SURFACE

Page 17: Reduce your attack surface by getting back to basics

THE FIRST STEP IS THE HARDEST

17 | Confidential

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

Internet

• Most ingenious step (social engineering, clever technical exploit delivery, …)• Much of the attack is happening outside of your control• Requires fancy defense technologies to mitigate

Page 18: Reduce your attack surface by getting back to basics

MAKE LATERAL STEPS HARDER FOR ATTACKER!

18 | Confidential

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

Internet

Step 1 Step 2 Step 3

Step 4 – exfiltrationGame Over

Page 19: Reduce your attack surface by getting back to basics

LATERAL STEPS

• The attacker is now on your turf

• Use your advantages:• Control your network• Know what traffic is usual and what is not

19 | Confidential

Page 20: Reduce your attack surface by getting back to basics

UNUSUAL – IN USUAL WAYS

• Lateral traffic is unusual – in usual ways

• Communicating parties that never communicate

• Protocols & ports that are never used

• Firewalls are really good at blocking such traffic

… as long as:• There are firewalls in the traffic path• The firewalls are properly configured

20 | Confidential

Page 21: Reduce your attack surface by getting back to basics

21 | Confidential

3. NETWORK SEGMENTATION AND SECURITY ZONES

Page 22: Reduce your attack surface by getting back to basics

RECOMMENDATION #1: SEGMENTATION

• Define network zones

• Place firewalls to filter traffic between zones

• Write restrictive policies for traffic between zones

22 | Confidential

Page 23: Reduce your attack surface by getting back to basics

USE TECHNOLOGY YOU KNOW WELL

23 | Confidential

2

3

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

Internet

Page 24: Reduce your attack surface by getting back to basics

USE TECHNOLOGY YOU KNOW WELL

24 | Confidential

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

Internet

Page 25: Reduce your attack surface by getting back to basics

SEGMENT THE NETWORK: INTERNAL FIREWALLS

25 | Confidential

Financial

Database

HVAC

Control

Partner

Network

Procurement

Department

Internet

• Place internal firewalls between network zones• Use SDN virtualization technologies to filter traffic inside data center

Page 26: Reduce your attack surface by getting back to basics

ZONES FOR HUMANS

• Humans are the weakest link

• Systems they touch directly are at risk

• Usual communication patterns:• Desktop/Laptop Server• Server Server

• Desktops don’t communicate with other desktops

• Servers don’t initiate connections to desktops

26 | Confidential

Page 27: Reduce your attack surface by getting back to basics

RECOMMENDATION #2: HUMAN-ACCESS ZONES

• Desktops in separate zones from servers• Firewalls between human-access zones and server zones

• Keep different departments in separate zones

27 | Confidential

Page 28: Reduce your attack surface by getting back to basics

RECOMMENDATION #3: SENSITIVE DATA ZONES

• Some types of data are more sensitive• Credit card data (PCI regulation)

• Personally Identifiable Information (GLBA, privacy laws)

• Medical data (HIPAA)

• Financial data (SOX, etc)

• Servers with sensitive data in separate zones

28 | Confidential

Page 29: Reduce your attack surface by getting back to basics

POLICY IN A SEGMENTED NETWORK

• Define the segmentation policy as a matrix:

29 | Confidential

Internal

Network

DMZ Peer’s

DMZ

Page 30: Reduce your attack surface by getting back to basics

ZOOM IN: FROM/TO THE PEER DMZ

30 | Confidential

Internal

Network

DMZ Peer’s

DMZ

Page 31: Reduce your attack surface by getting back to basics

31 | Confidential

4. MANAGING ZONED NETWORKS WITH ALGOSEC

Page 32: Reduce your attack surface by getting back to basics

WORKING WITH A SEGMENTED NETWORK

• Preparation:• Identify the network segments

• Create a segmentation policy matrix (spreadsheet)

• Place internal firewalls / virtualized filters between zones

• Continuous Compliance • Ensure that firewalls enforce the segmentation policy

• Change Requests• Identify all the firewalls that need to be modified• What-if proactive risk check against segmentation policy

32 | Confidential

Page 33: Reduce your attack surface by getting back to basics

IMPORT SEGMENTATION POLICY SPREADSHEET

33 | Confidential

Page 34: Reduce your attack surface by getting back to basics

CONTINUOUS COMPLIANCE

• Daily analysis of all firewalls

34 | Confidential

Page 35: Reduce your attack surface by getting back to basics

CONTINUOUS COMPLIANCE

• Automatically check segmentation policy

35 | Confidential

Page 36: Reduce your attack surface by getting back to basics

CONTINUOUS COMPLIANCE

… and best-practices knowledge base

36 | Confidential

Page 37: Reduce your attack surface by getting back to basics

MAKING A CHANGE REQUEST

37 | Confidential

Page 38: Reduce your attack surface by getting back to basics

AUTOMATICALLY IDENTIFY DEVICES TO MODIFY

38 | Confidential

2 traditional firewalls separate network into zones

Page 39: Reduce your attack surface by getting back to basics

AUTOMATICALLY IDENTIFY DEVICES TO MODIFY

39 | Confidential

VMware NSX firewall filters all traffic inside the datacenter

Page 40: Reduce your attack surface by getting back to basics

EXPLORE PATH DETAILS

40 | Confidential

Page 41: Reduce your attack surface by getting back to basics

WHAT-IF RISK CHECK

• How were the risks checked?

41 | Confidential

Page 42: Reduce your attack surface by getting back to basics

WHAT-IF RISK CHECK

• How were the risks checked?

• Network segmentation matrix!

42 | Confidential

Page 43: Reduce your attack surface by getting back to basics

IMPLEMENT…

• Automatically creates ‘Work Order’ per device

• Implements new rules

… Details in another webinar!43 | Confidential

Page 44: Reduce your attack surface by getting back to basics

SUMMARY

• Attacks requires persistency. Keep an eye out for unusual internal and outbound traffic

• Take control your turf: Make lateral steps within your network harder for attackers• Segment the network• Segment the users

• Segment sensitive data

• Maintain control• Intelligent, structured process for change requests

• Proactively assess risk

• Ensure continuous compliance

44 | Confidential