air r11 incident response beyond enterprise it final
2020-03-01 54浏览
- 1.SESSIONID:AIR-R11 Incident Response beyond Enterprise IT Jason Escaravage Phil Hamill Senior Vice President Booz Allen Hamilton Principal Booz Allen Hamilton #RSAC
- 2.#RSAC Introduction Agenda 1 The IR Landscape is Changing New challenges for today’s IR capability 2 Cloud IR Challenges • Threats in the cloud • Differences with cloud IR • Jumpstart your Cloud IR Capability 3 4 By the end of this session, youwill: Learn how threat actors have evolved their approach in targeting OT and Cloud Understand why IR looks different in these emerging domains Discover who the key “players” are in your organization to tackle IR in OT and Cloud OT IR Challenges • Threats to your OT environment • Differences with OT IR • OT IR Journey • Jumpstart your OT IR Capability Walk away with actionable steps to take when you get back to the office Useful Reference Sources 2
- 3.The World Looks Different Today #RSAC Yesterday • Scope – Enterprise IT servers, workstations, and devices • Assets – Mostly company owned and managed • Access – IR staff had authority, access, expertise, and rights of way Today • • • • Scope – Now includes Enterprise, Cloud, OT, IoT, IIoT, Mobile… Assets – Assets not all owned/managed (ex. SaaS, Joint Ventures, BYOD Mobile) Access – New stakeholders and coordination across teams, geographies, and providers Shifting Focus – Adversaries are targeting weaknesses in emerging domains 3
- 4.#RSAC Emerging Domains Are Shaping IR Strategy Yesterday Today OT/ICS OT/ICS • • • • • • Defense-in-depth strategy starting at a defined perimeter Slow-changing / static environment Logs feeding SIEM -> SOC -> IR EDR tools for live response Containment benefits from control / proximity / access OT “isolated” behind a firewall • • • • • • Perimeter evaporated and cloud environment shifts rapidly Former on-prem services now in the cloud External logs may have reliability / availability issues EDR deployment complicated by volume and velocity Containment is hampered by volatility and lack of access OT / IT convergence and new connectivity requirements
- 5.Emerging Domains Present Challenges for IR New domains introduce new efficiencies, and also added risks and challenges for IR New stakeholders Must work with new internal stakeholders and external providers under a shared responsibility model Connected but vulnerable OT Systems Increased connectivity presents new attack vectors Lack of OT system expertise OT environments are often characterized by highly specialized systems and non-traditional IT components Dynamic environments in cloud Speed 5and automation are critical, target state unknown, platforms and services may change quickly Lack of cloud environment and tool expertise Cloud services are not one-dimensional – each model of cloud (IaaS, PaaS, SaaS) requires different approaches and tools #RSAC
- 6.Cloud IR Challenges
- 7.#RSAC Threats in the Cloud New environments lead to new actors/threats Commodity crime is leaning into cloud for resources/crypto-mining; APTs know critical data may be duplicated to poorly protected or unsupervised cloud environments, so why bother attacking hardened legacy corp net? Top Cloud Threats Poor / Default Configs Poor Identity Control API Abuse Availability Attacks Side Channels Breaches are often due to a database or server exposed to the internet with no or minimal authentication, spilling massive amounts of (often regulated) data. Developers may expose sensitive credentials on public sites; org may fail to follow least privilege principles; or staff might be creating shadow IT via rogue accounts / environments. Application developers prioritizing speed and functionality may not comprehend abuse potential of APIs, exposing customer data or infrastructure. Massive IoT botnets can now target cloud-scale providers previously viewed as unsinkable. Incidents may also not be intentional but result of CSP failures affecting entire regions. For now mostly academic, but compute and storage is (usually) not bare metal, which exposes resources to VM escapes, timing attacks, and other methods of leaking data in shared environments. These are not threats that map to a legacy IR model
- 8.What’s different about Cloud IR #RSAC Cloud Moves at Warp Speed Everything happens way too fast for reactive IR to start when an alert comes in Dynamic resources require dynamic response capabilities Playbooks / runbooks don’t cut it - IR runbooks need to be CODE in order to respond to events in time (can’t pull memory from a terminated instance, or isolate an infected lambda that already ran) Push left, integrate security in the space between SDLC and Prod You must automate IR throughout deployment process o Code environments for robust enforcement of security resources (ex. instances without EDR, insecure fw rules, or unencrypted storage get killed immediately and without appeal) Failure to adopt cloud native solutions, will leave you with legacy solutions Taking a server, turning it into a VM and hosting in AWS is NOT cloud computing (but it is what many legacy enterprises do anyways)
- 9.#RSAC Getting the Right Players For Cloud IR Response Mission DevOps Engineers Architect and maintain robust visibility and response operations in the cloud SMEs for building and integrating response capabilities with existing cloud environment Design monitoring requirements and determine alert/action thresholds • • Coordinate incident from alert to resolution • • Perform forensics on data isolated/retrieved by automated response tools/actions • General Responsibilities Cyber Incident Response • Note/escalate irregular behavior within cloud environment Provide best practices/SMEs to help develop automated response tools/actions Integrate containment requirements into environment architecture Cloud Service Providers (e.g. AWS, Azure, GCP) Provide unique high-level visibility, access, or assistance • Alert on system-level/macroscale events or issues • Respond to requests for features/data to support response operations • Support root cause analysis and troubleshooting Though not inclusive of the entire team, these primary players form the foundation of the Cloud IR Response Team 9
- 10.#RSAC Understand Your Cloud Maturity Cloud affects all areas of Incident Response •People:Cloud-native skills required •Processes:New playbooks designed around integration with deployment pipeline, new SLAs •Technology:Forge new tools and fully automated/intelligent response capabilities Basic Intermediate Indicators • Direct port of legacy server- • DevOps team with scalable based resources to cloud CI/CD pipeline hosting • Dynamic Networking • Basic network layout • Role-Based Access Control • Discrete access controls/IAM Traits Legacy IR processes and tools may still be effective Advanced • Containerized architecture on top of automated distributed compute system (ex. Kubernetes) • Advanced/multi-cloud dynamic network • Federated, per-user Single Sign-On Leverage DevOps team for IR team with cloud-native skillset is additional monitoring capabilities; required to build customized automated response tooling adjust SLAs
- 11.What’s Next? Here’s what you should do when you return to the office Jumpstart your Cloud Incident Response Program Cloud IR migration is a journey. Where does your org sit? Where does it want/need to be? 1 Legacy Transfer Direct port of legacy server-based resources to cloud hosting. Old EDR/ and log forwarding could still be effective in this configuration. 4 Update TTPs Ensure best practices in Cloud Incident Response by updating and maintaining playbooks, polices, procedures, SLAs and tooling to incorporate cloud resources. 2 Access Control 3 Dynamic Resources Leverage the scalability of cloud resources to optimize your environment and dynamically scale existing security policies and technologies. Even with a basic network layout, attention must be paid to enforce Role-Based Access Control. This may or may not integrate with existing authentication systems. 5 Dev Ops Integration Using IR team members with cloudnative skillsets, implement a full DevSecOps deployment pipeline utilizing automation and advanced tools to enable intelligent response. 11 6 Continuous Improvement Cloud-native IR must continue to adapt as the business adopts new cloud services or develops new applications leveraging cloud resources. #RSAC
- 12.OT IR Challenges
- 13.#RSAC Threats in OT OT incidents are likely to generate more attention than a typical IT incident. Threat actors are targeting OT environments below Level 4 Target weaknesses in outdated industrial equipment Can leverage access through unsecure OT to gain access to broader company networks Targets the weakest link Can cause physical impacts through cyberattacks 13 Crypto Mining Malware TRITON Malware NotPetya WannaCry Ransomware 2018 Crypto mining attack consumed the bandwidth of a water utilities HMIs causing security tools to fail 2017 TRITON malware attack targeted a major manufacturing plant, disabling safety systems and leaving the plant vulnerable 2017 Malicious actors use a C2 backdoor to execute malware on infected machines significantly impacting organizations 2017 cyber virus which locked down IT and OT assets globally, demanded system owners to pay a ransom to restore system operations.
- 14.#RSAC What’s Different About OT Health and Safety factors Incident responders need a full understanding of the consequences of their actions • Shutting down key processes can result in unsafe conditions and disrupt access to life-safety critical systems (e.g. gas detectors, oxygen meters) Environment Challenges Real-time OS’s, non-traditional protocols, application and network dependencies that are unknown/undocumented Need for Specialized Response Tooling and Training Special response tooling may be required (embedded devices, RTUs, and PLCs) Varying Response Motivations Response stakeholder motivation may vary – Response objective of OT engineers/operators may not align to Cyber IR objectives 14
- 15.#RSAC Getting the Right Players For OT IR Response Mission • General Responsibilities • • Cyber Incident Response Site / Process Engineers Enable successful incident response Provide permissions, access and site expertise Coordinate incident functions and facilitate information sharing Identify containment / remediation activities for critical vulnerabilities Perform forensics and containment Vendors (e.g. Honeywell, Rockwell, Emerson) Assist in troubleshooting and replacement of vendor components/systems • Report system irregularities occurring onsite • Assist site personnel in performing troubleshooting • Provide access and permissions to investigate infected systems and embedded devices • Repair or replace infected systems • Support root cause analysis and troubleshooting • Provide expertise regarding site operations Though not inclusive of the entire team, these primary players form the foundation of the OT IR Response Team 15
- 16.#RSAC OT IR Transformation Journey "Standard cyber incident remediation actions deployed in IT business systems may result in ineffective and even disastrous results when applied to ICS cyber incidents, if prior thought and planning specific to operational ICS is not done." - DHS STAKEHOLDER ALIGNMENT INSTRUMENT ESTABLISH ROLES/ RESPONSIBILITIES AT SITE LEVEL DEPLOY DETECTION SENSORS DESIGNATE RESPONSE OWNERS (EX. SITE LIAISON) ASSET INVENTORY DATA / LOGS DEPLOY CENTRALIZED AGGREGATION SYSTEM ENSURE LOGGING IS ENABLED AND SUFFICIENT FOR DETECTION AND RESPONSE CONNECTIVITY AND ACCESS ENABLE REMOTE ACCESS TRAIN FIRST RESPONDERS VENDOR SERVICE AGREEMENT RESPONSE TOOLKIT UTILIZE IMAGE GATHERING AND FORENSIC TOOLS UTILIZE CONTAINMENT TOOLS MAINTAIN CENTRAL LOCATION FOR TOOLKIT STORAGE IR STAFF WITH TRAINING AND EXPERIENCE 16 PLANS / PLAYBOOKS OT PLAYBOOK(S) COMMUNICATIONS PLANS THREAT-BASED RUNBOOKS CONTAINMENT (PATCHING, CONFIGURATION CHANGES, ISOLATION)
- 17.What’s Next? Here’s what you should do when you return to the office #RSAC Jumpstart your OT Incident Response Program 1 Response Playbooks Develop IR playbooks for events impacting the OT domain. Identify and engage with new stakeholders. 5 IR for Offsite OT Assets Define a strategy for deploying IR fly-away teams and tools to “off estate” assets (e.g., contractor, jointventure operated site). 3 Emergency Remediation Planning 2 Enterprise Alignment Access and Privileges Develop “rights of way” between Cyber Defense Ops, IT, third-party providers, and site engineering. Develop IR playbook to facilitate options for emergency containment, patching, or the deployment of remediation actions. 6 4 7 IR Workbench Training Train IR staff on the OT environment landscape, OT investigative methodologies, and enable test environments for staff to practice IR on simulated control system workstations and components. Implement an IR response workbench with Admin/remote access, live response, tools/scripts, forensic tools, etc. 17 Secure remote accesses and elevated privileges for IR staff designated to handle OT incidents. 8 IR Exercises Conduct periodic IR exercises of varying levels of complexity, and inclusive of cyber, domain-specific, and enterprise stakeholders.
- 18.#RSAC Case Study Global Oil Field Services organization that sought to enhance detection and response capabilities for its OT facilities • • • • • • • • OUTCOMES Challenges Silos – No agreement between OT and Cyber to enable detect and respond responsibilities Limited Access – First responders had limited remote access to respond to incidents at OT sites Insufficient Visibility – Detection capabilities were not deployed consistently across all OT sites Knowledge Gap – Cyber responders lack working knowledge of OT systems; OT personnel lack understanding of cyber capabilities Activities Multiple workshops to identify key stakeholders (internal and external to the organization) Documented the process and workflows to understand the operating environment Conducted incident scenario exercises to develop functional response activities Established Severity Criteria and target state requirements for visibility, detection, and response Drafted actionable Incident Management Plan and IR Playbooks 18 An agile and adaptable cyber security organization able to effectively respond and contain unknown threats to the organization Delivered new shared responsibility models for teams which had not worked together in the past Defined strategic direction for further maturing the organization’s detection and incident response capabilities
- 19.References and Helpful Sites OT Incident Responsehttps://dragos.com/resource/lessons-learned-from-threat-hunting-responding-to-industrial-intrusions/https://www.boozallen.com/c/insight/publication/top-8-cybersecurity-trends-for-2019.htmlhttps://www.researchgate.net/publication/266477470_Developing_Cyber_Forensics_for_SCADA_Industrial_Control_Systemshttps://www.boozallen.com/s/insight/thought-leadership/industrial-cybersecurity-threats-are-on-the-rise.htmlhttps://www.langner.com/ot-security-incident-management/https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/final-RP_ics_cybersecurity_incident_response_100609.pdfCloud Incident Responsehttps://www.sans.org/reading-room/whitepapers/incident/incident-response-amazon-ec2-first-responders-guide-security-incidents-cloud-36902https://aws.amazon.com/blogs/publicsector/building-a-cloud-specific-incident-response-plan/https://www.okta.com/security-blog/2018/04/incident-response-in-the-cloud-%E2%80%93-is-your-security-team-ready/https://d1.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf#RSAC
- 20.#RSAC QUESTIONS
- 21.#RSAC THANK YOU FOR MORE INFORMATION, PLEASECONTACT:JASON ESCARAVAGE SENIOR VICE PRESIDENT ESCARAVAGE_JASON@BAH.COM BOOZALLEN.COM/ICS PHIL HAMILL PRINCIPAL – OT CAPABILITY LEAD HAMILL_PHILLIP@BAH.COM