The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank...

40
The New Frontier: Cb it f A dit Cybersecurity for Auditors Briefers: Peg Bodin, Local IS Audit Manager A M Chi fI f i S i Offi Aaron Munn, Chief Information Security Officer Erin Laska, Performance Audit Supervisor Washington State Auditor’s Office

Transcript of The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank...

Page 1: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

The New Frontier: C b it f A ditCybersecurity for Auditors

Briefers:Peg Bodin, Local IS Audit Manager

A M Chi f I f i S i OffiAaron Munn, Chief Information Security OfficerErin Laska, Performance Audit Supervisor

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e

Page 2: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Outline

Risk

Threat

A dit A hAudit Approach

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 2

Page 3: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

H k hiHackers hit small US town, steal tax payer data and $400,000

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 3

Page 4: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 4

Page 5: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

County Government Settles Potential HIPAA Violations

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 5

Page 6: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 6

Page 7: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Washington Courts data breach in 2012

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 7

Page 8: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Could this happen to you?

Employee clicked on link with malware

Malware installed key stroke logger

Key stroke logger captured the employee user-id and password

The user-id and password was used to change employee’s direct deposit bank account

Pay check went to someone else’s bank account

Employee noted missing checkp y g

Employee changes password…

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 8

Page 9: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

RISK

Very large dollars

Very hard to recoverVery hard to recover

Very difficult to prosecute

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 9

Page 10: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Government as the target: Why?

Dollars Dollars

Data

Infrastructure

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 10

Page 11: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Likelihood

A 2014 study, by the Ponemon Institute, estimated

governments have a one-in-four chance of experiencing a material data breach (more than 10,000 records) in hthe next two years.

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e

http://www-935.ibm.com/services/us/en/it-services/security-services/cost-of-data-breach/11

Page 12: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Cost of a Data Breach

The 2014 study by the Ponemon Institute, estimated:

the average cost for each government record lost is $172

A formal incident response plan in place prior to the incident reduces the cost

Data breaches caused by third parties increase cost

incidents involving the loss or theft of data bearing devices increased cost

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e

http://www-935.ibm.com/services/us/en/it-services/security-services/cost-of-data-breach/12

Page 13: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Costs of a Data Breach

Direct financial costs

Fraudulent wire transfers 100,000 - 200,000

(2010 avg per MS-ISAC http://msisac.cisecurity.org/)

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 13

Page 14: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Costs of a Data Breach

In addition to direct financial losses:

• Forensic experts

• Notifying affected victims y g

• Identity / credit card monitoring

• Regulatory penalties

• Repairing public relationsp g p

• Legal assistance

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 14

Page 15: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

South Carolina

A Department of Revenue employee clicked on li k i il d i ll d la link in an email and installed malware.

As many as 3.6 million Social Security numbers and 387 000 credit and debit card numbersand 387,000 credit and debit card numbers used by state taxpayers could have been exposed as a result of the cyber-attackexposed as a result of the cyber attack.

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 15

Page 16: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

South Carolina

Initial estimated costs according to one source:

$ 500 000 Mandiant IT expert assistance$ 500,000 Mandiant, IT expert assistance

$12,000,000 Experian Credit Monitoring Reports

$ 800 000 I d i f ti it$ 800,000 Improved information security capabilities

$ 100 000 Outside legal help$ 100,000 Outside legal help

$ 150,000 Public relations campaign

$ 740 000 Notify out of state taxpayers$ 740,000 Notify out-of-state taxpayers

Subsequent reports have doubled this cost to $25 million

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e

million

16

Page 17: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Costs of a Data Breach

Regulatory

HIPAA fines

PCI non-compliance penalties

Prohibited accessProhibited access

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 17

Page 18: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Nature of risks (most common causes)

Malware, Malicious or Criminal ,attacks

Insider Misuse

Theft or Loss

Misc. Errors

PEOPLE

http://www.verizonenterprise.com/DBIR/2014/

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 18

Page 19: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Okay, it’s a problem. Where do we start?

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 19

Page 20: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Risk is the probability of a threat agentexploiting a vulnerability to cause p g yharm to an asset and the resulting business impactp

S M G Hill Ed i CISSP id

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e

Source: McGraw Hill Education, CISSP exam guide

20

Page 21: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Risk Assessment

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 21

Page 22: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Risk Assessment

Focus efforts on the most critical i f ti tinformation or assets

Be dynamic and iterativeBe dynamic and iterative

Reflect internal and external threats

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 22

Page 23: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Threat

Characteristics

C bili i Capabilities

How do they do it?How do they do it?

What are they after?

Future threat

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 23

Page 24: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Characteristics

Malicious actors

Disgruntled Employee(s)

Activists

Criminal organizationsCriminal organi ations

Extremist / Terrorist Groups

Nation States Nation States

Requirements

L b i t t Low barrier to entry

Internet connection

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e

Internet capable device24

Page 25: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Capabilities

Phishing / Spear-phishing

Web site exploitation Web site exploitation

Malicious Software (Malware)( )

Man-the-middle attacks

Distributed Denial of Service (DDoS)

Social EngineeringSocial Engineering

Botnet

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 25

Page 26: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

How do they do it?

“Company loses $17m in email scam,” article from Omaha.com

Fake email addresses

Fake phone numbers Fake phone numbers

Impersonating corporate Auditors and the CEO

Targeted emails to corporate controller

Wire transfers to Chinese entities

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 26

Page 27: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

How to they do it?

“Bank hackers steal millions via malware,” article from New York Times

S hi hi Spear-phishing

Worked with Botnet controllers for target information

Established own botnet for exploitation Established own botnet for exploitation

Owned the banks email server

Remote control over ATM’sRemote control over ATM s

Common tools for remote control functions

Create methods to hide transactions

Changing firewall rules

Possibly years of exploitation

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 27

Page 28: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

How to they do it?

“Anthem Breach May Have Started in April 2014,” article from Krebs on security

80 million SSN #’s exfiltrated

Same forensics footprint of “Deep Panda”

Privileged network credentials compromised

Possible compromised VPN

Possible phishing web site called we11point.com (former name of Anthem)

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 28

Page 29: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

What are they “After”

Bank account information

Driver license InformationDate of birth

Social Security Number

Electronic Medical RecordLogin / passwords

Address

Credit Card Information

Phone Number

Your Computer!

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 29

Your Computer!

Page 30: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Future threat

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 30

Page 31: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 31

Page 32: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Presentation topics reviewed

Audit ScopeAudit Scope

Before you get started

Considerations for contracting

Planning for the reportPlanning for the report

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 32

Page 33: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Scope

Compliance with:

• Entity policies• Entity policies

• Best practice

Ensure entity policies align with best practice

Recent experience an State in Washington stateWashington state• State agencies are required to comply with Office of

the Chief Information Officers IT Security Standards

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e

the Chief Information Officers IT Security Standards

33

Page 34: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Scope

Vulnerability assessmentVulnerability assessment

Examples of the types of findingsp yp g

Appropriate Expertise

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 34

Page 35: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Scope

P i iPenetration testing

Different than a vulnerability scanDifferent than a vulnerability scan

Non technical methods

Examples of the types of findings

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 35

Page 36: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Before you get started

Consider your own IT securityConsider your own IT security

How will you protect the information you gather during the audit

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 36

Page 37: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Considerations for contracting

For compliance, vulnerability assessment and penetration testingand penetration testing

Non disclosure agreements

Data sharing agreement

Insurance Insurance

Background checkg

Subcontracting

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 37

Page 38: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Consideration for contracting

For penetration testing

Location of the testersLocation of the testers

Rules of Engagement

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 38

Page 39: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Plan for the Report

Will there be a public report?

If yes, what level of detail will beIf yes, what level of detail will be included?

The level of detail in IT security audits reportsThe level of detail in IT security audits reports varies widely

State Auditor’s OfficeState Auditor’s Office

Federal agencies (Inspector Generals d GAO)and GAO)

Other State’s

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 39

Page 40: The New Frontier: Cb it f AditCybersecurity for Auditors · Pay check went to someone else’s bank account ... and 387 000 credit and debit card numbersand 387,000 credit and debit

Questions

Aaron MunnChi f I f i S i OffiChief Information Security Officer

(360) [email protected]

Erin Laska Peg BodinSenior Performance Auditor

(360) [email protected]

Local IS Audit Manager(360) [email protected]

W b it

W a s h i n g t o n S t a t e A u d i t o r ’ s O f f i c e 40

Website: www.sao.wa.govTwitter: www.twitter.com/WAStateAuditor