SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Edith Cowan University
Security Research Institute




       Lessons learnt from the OAG
        audits of State Government
                  Agencies

                                 Andrew W d
                                 A d      Woodward d
                              Security Research Institute

                                 Copyright 2012 - Security Research Institute, Edith Cowan University
Edith Cowan University
Security Research Institute




                                                                                                     Agenda
   •     Results of current and previous audits
   •     What we did and how we did it
   •     Impact of audits on cyber security
   •     Lessons learned
   •     A few facts about the threat landscape
   •     What role the CUA?
   •     Do we need a State CIO?
   •     Conclusion
                              Copyright 2012 - Security Research Institute, Edith Cowan University
Edith Cowan University
Security Research Institute




                              OAG cyber audit – key questions
  • Has the agency conducted risk assessments for
    cyber threats?
  • Is there a security policy and/or framework that
    consider cyber th t ?
         id     b threats?
  • Are controls in place to effectively detect and
    manage cyber intrusions?
  • Are incident response p
                     p      plans and recovery y
    processes in place?
Edith Cowan University
Security Research Institute




                                            What we did
• Technical controls audit
        – U d open source t l t scan websites t
          Used                 tools to       b it to
          identify ports, services and vulnerabilities
        – Use of other information gathering tools to
          identify other servers and information assets
        – Penetrated selected systems
• Human factor audit
        – Sent spear-phishing emails to target
          organisation(s)
               i ti ( )
        – USB drops with benign “phone home” code
Edith Cowan University
Security Research Institute




                              Summary of 2011 audit – results
  • Fourteen of the 15 agencies we tested failed to
    detect,
    detect prevent or respond to our hostile scans of
    their Internet sites.
  • W accessed the i t
    We             d th internal networks of three
                                l t     k f th
    agencies without detection, using identified
    vulnerabilities f
       l     biliti from our scans. W did not t t th
                                      We        t test the
    identified vulnerabilities at the other 12 agencies.
  • Eight agencies plugged in and activated the USBs
    we left lying around.
Edith Cowan University
Security Research Institute




                              Summary of 2011 audit - results
  • Twelve of the 15 agencies had not recognised and
    addressed cyber threats from the Internet or social
    engineering techniques in their security policies.
  • Ni agencies h d not carried out risk
    Nine        i had t         i d t i k
    assessments to determine their potential exposure
    to t
    t external or internal attacks.
              l i t      l tt k
  • Seven agencies did not have incident response
    plans or procedures for managing cyber threats
    from the Internet and social engineering.
Edith Cowan University
Security Research Institute




                              Summary of 2012 Audit
  • In one agency we identified a vulnerability in their
    online payment system that would allow fraud to be
    committed
  • I another agency we uploaded non-malicious fil
    In     th                 l d d           li i    files
    to their web server
  • We identified three significant cross-site scripting
    (XSS) vulnerabilities on three of the agencies’ web
    servers. The web content management systems for
    each of these agencies were also identified
Edith Cowan University
Security Research Institute




                              Summary of 2012 Audit
• Two agencies were potentially vulnerable to SQL
  injection (not tested)
• At one agency we obtained personal and sensitive
  information of 17 employees from scans of web
  servers
• O agency had not applied any software updates
  One           h d         li d       f        d
  to its web server for more than two and a half years.
  As
  A a result, this particular server h d h d d of
             l hi      i l           had hundreds f
  vulnerabilities, some of these could provide system
  level access t servers, while others allowed th
  l    l        to            hil th      ll  d the
  interception of information
Edith Cowan University
Security Research Institute




                              Summary of 2012 audit
  • Three other agencies also failed to apply software
    updates leaving them vulnerable to some exploits
                                               exploits.
  • USB sticks were left at agencies (again) and were
    activated b several agencies. H
       ti t d by       l        i   However, th
                                              these
    were blocked by ServiceNet.
  • ServiceNet reported traffic from within government
    networks attempting to establish external
    connections which were automatically denied.
  • Some USBs did phone home successfully from
                    p                         y
    private addresses (again)...
Edith Cowan University
Security Research Institute




                              Summary of 2012 audit
  • Spear phishing emails were sent to one agency,
    and within minutes of sending out the email we
    received an autoreply confirming that the email had
    passed through protective filtering services and
    was reaching email in-boxes.
  • Th email was only sent t one agency h
    The       il      l     t to             however
    there were many employees that clicked on the link
    from different agencies within one d
    f    diff    t      i      ithi     day.
Edith Cowan University
Security Research Institute




                                                 Impact of audits
 • IPS capability has now been implemented by
   ServiceNet,
   ServiceNet providing protection for a number of
   agencies and blocking nuisance traffic
 • Awareness of social engineering has been raised
 • The new ISMS specific CUA references the cyber
   audit and li
      di   d lists vendors who can assist with relevant
                      d     h          i   ih l
   issues:
       “Recent Auditor General reports (June 2011) concluded generally that
       agencies had failed to take a risk-based approach to identifying and
       managing cyber threats, and to meet or implement g
            g g y              ,                  p       good ppractice
       guidance and standards for computer security.”
Edith Cowan University
Security Research Institute




                                 The most feared object in WA?




                              Buyers Guide – Information Security Management Services: CS14998
Edith Cowan University
Security Research Institute




                                       Lessons learned
  • Patching, patching, patching!
  • Governance
          – Lack of or flaw in tech control can often be
                 of, flaw,
            traced back to governance issues
  • Information security management -> risk
                                     >
    management
          – Where are the information assets?
          – Who owns them?
          – Have cyber specific threats been identified?
Edith Cowan University
Security Research Institute




                                  Lessons learned (cont)
  • Policy
          – lack of (cyber incident policy)
          – lacking – who to report to and when
                  g             p
          – lack of review phase
  • Over reliance / focus on technical controls
          – DSD list (top 4 are technical)
          – CUA (testing services category technically focused)
  • People continue to be the softest target
          – User education No. 8 on the DSD list...
Edith Cowan University
Security Research Institute




                              Tech is not the answer you seek
        “The more sophisticated the technology, the
        more vulnerable it i t primitive attack.
               l     bl    is to i iti    tt k
        People often overlook the obvious.”

  Tom Baker as Doctor Wh i Th Pirate Pl
  T   B k      D      Who in The Pi  Planet (19 8)
                                            (1978)
Edith Cowan University
Security Research Institute




                                     Threat landscape




                              Source: http://www.mandiant.com/threat-landscape/
Edith Cowan University
Security Research Institute




                              Source: http://www.mandiant.com/threat-landscape/
Edith Cowan University
Security Research Institute




                                        New challenges
  • BYOD and cloud bring new challenges to
    ISM in general, and i state government
        i        l    d in t t           t
    agencies
          – Multinational banned BYOD, then found they
            had 7000 in the o ga sa o
             ad 000        e organisation...
  • An increasing shift towards targeting the
    human factor not the tech
           factor,
          – Being reported increasingly in cyber security
            briefs
Edith Cowan University
Security Research Institute




                              The weakest link...
Edith Cowan University
Security Research Institute




                                                    Suggestions
  • Increase security education training and
    awareness programs (SETA)
  • Follow ISO 27000 cyclical approach to ISM:
          Plan, Do, Check, Act
  • Implement risk management as a subsidiary of
    information security management
          – Identification and ranking of information assets; Identify
            owner of information assets
  • Metrics and measures!!! While it works, security is
                                                   y
    seen as a cost, not a benefit...
Edith Cowan University
Security Research Institute




                              Common Use Agreement
  • Pro’s
          – Li it who can provide services (/idi t filt on)
            Limits h             id      i    (/idiot filter )
          – Provides consistency to agencies seeking services
          – Th Information Security Management section contains a
            The I f       ti S      it M             t     ti  t i
            link to the cyber health check spreadsheet – very clever!
  • C
    Cons
          – “Testing Services” category focuses on tech too much:
            not as holistic as it could b ?
              t    h li ti           ld be?
          – Evidence found in audits would suggest that the previous
            CUA wasn’t working, will this one be any better?
                  wasn t working
Edith Cowan University
Security Research Institute




                              State Office of the CIO
  • Audit has played a role in improving Info Sec
    across WA agencies   i
  • It is a useful tool to “prompt” agencies to
                            prompt
    improve their security
  • Wh t if they don’t k
    What th d ’t know h ?      how?
  • Smaller agencies do not have the resources
                g
    that larger agencies / corporations possess
  • They are held up to a standard which doesn’t
                                            doesn t
    exist (fair criticism)
Edith Cowan University
Security Research Institute




                              State Office of the CIO
  • Finance currently leading the cyber charge,
    and th CUA providing h lth check i good,
       d the            idi health h k is     d
    but is this the aim of this function?
  • Would a central agency which creates a
    standard and provides advice to agencies on
    ISM improve security?
Edith Cowan University
Security Research Institute




                                                                                                     Conclusion
  • Overall, cyber security is good - always room for
    improvement
  • Most organisations overly reliant on technical
    controls – need more f
        t l       d        focus on people and policy
                                         l    d li
  • There appears to be a disconnect between what
    the government is saying and what agencies are
    hearing - a State cyber security standard or Office
    of the CIO may be helpful
  • Blue USB thumb drives are to be feared

                              Copyright 2012 - Security Research Institute, Edith Cowan University
Edith Cowan University
Security Research Institute




                                      The end?
  • Questions or comments?


  • Contact the Security Research Institute for
                         y
    further information:
    e: sri@ecu edu au
       sri@ecu.edu.au
    p: 08 6304 5176

Weitere ähnliche Inhalte

Was ist angesagt?

Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Tyrone Grandison
 
A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingYogeshIJTSRD
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Marco Morana
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Jisc
 
Cyber security for system design
Cyber security for system designCyber security for system design
Cyber security for system designTom Kaczmarek
 
IT system security principles practices
IT system security principles practicesIT system security principles practices
IT system security principles practicesgufranresearcher
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-finalMarco Morana
 
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Sverige
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGDrm Kapoor
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelCSCJournals
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsPECB
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference PopovskyBrian Rowe
 
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?dianadvo
 
From velvet to silk there is still a lot of sweat
From velvet to silk  there is still a lot of sweatFrom velvet to silk  there is still a lot of sweat
From velvet to silk there is still a lot of sweatStefano Maccaglia
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Dan Morrill
 

Was ist angesagt? (20)

Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010
 
A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration Testing
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?
 
Cyber security for system design
Cyber security for system designCyber security for system design
Cyber security for system design
 
IT system security principles practices
IT system security principles practicesIT system security principles practices
IT system security principles practices
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-final
 
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscape
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
 
From velvet to silk there is still a lot of sweat
From velvet to silk  there is still a lot of sweatFrom velvet to silk  there is still a lot of sweat
From velvet to silk there is still a lot of sweat
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 

Andere mochten auch

Motivos, actitudes y estrategias de aprendizaje
Motivos, actitudes y estrategias de aprendizajeMotivos, actitudes y estrategias de aprendizaje
Motivos, actitudes y estrategias de aprendizajeJuan pablo Peñuela
 
El encuentro de dos Perues
El encuentro de dos PeruesEl encuentro de dos Perues
El encuentro de dos Peruescludiadiego
 
EduketingColombia-EFQM-Gonzalo Arboleda
EduketingColombia-EFQM-Gonzalo ArboledaEduketingColombia-EFQM-Gonzalo Arboleda
EduketingColombia-EFQM-Gonzalo ArboledaEDUKETING
 
B carnes y_derivados_-_def
B carnes y_derivados_-_defB carnes y_derivados_-_def
B carnes y_derivados_-_defEmagister
 
Data of the australian ICT market - Australia ict industry 2015
Data of the australian ICT market - Australia ict industry 2015Data of the australian ICT market - Australia ict industry 2015
Data of the australian ICT market - Australia ict industry 2015Elioplus .com
 
Manejo de situaciones problemáticas
Manejo de situaciones problemáticasManejo de situaciones problemáticas
Manejo de situaciones problemáticasEmagister
 
NCTA 5 min presentation (2) PP show
NCTA 5 min presentation (2) PP showNCTA 5 min presentation (2) PP show
NCTA 5 min presentation (2) PP showSimon Hanney
 
Share point training branding 2010
Share point training   branding 2010Share point training   branding 2010
Share point training branding 2010JaggyGT
 
Эвристическая оценка, или как решить проблемы в интерфейсе за час
Эвристическая оценка, или как решить проблемы в интерфейсе за часЭвристическая оценка, или как решить проблемы в интерфейсе за час
Эвристическая оценка, или как решить проблемы в интерфейсе за часПрофсоUX
 
Как и когда использовать айтрекер на юзабилити тестировании
Как и когда использовать айтрекер на юзабилити тестированииКак и когда использовать айтрекер на юзабилити тестировании
Как и когда использовать айтрекер на юзабилити тестированииПрофсоUX
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Управление Рисками в бизнес-анализе
Управление Рисками в бизнес-анализеУправление Рисками в бизнес-анализе
Управление Рисками в бизнес-анализеSQALab
 
To requirements and beyond...
To requirements and beyond...To requirements and beyond...
To requirements and beyond...SQALab
 

Andere mochten auch (15)

Motivos, actitudes y estrategias de aprendizaje
Motivos, actitudes y estrategias de aprendizajeMotivos, actitudes y estrategias de aprendizaje
Motivos, actitudes y estrategias de aprendizaje
 
El encuentro de dos Perues
El encuentro de dos PeruesEl encuentro de dos Perues
El encuentro de dos Perues
 
EduketingColombia-EFQM-Gonzalo Arboleda
EduketingColombia-EFQM-Gonzalo ArboledaEduketingColombia-EFQM-Gonzalo Arboleda
EduketingColombia-EFQM-Gonzalo Arboleda
 
B carnes y_derivados_-_def
B carnes y_derivados_-_defB carnes y_derivados_-_def
B carnes y_derivados_-_def
 
Data of the australian ICT market - Australia ict industry 2015
Data of the australian ICT market - Australia ict industry 2015Data of the australian ICT market - Australia ict industry 2015
Data of the australian ICT market - Australia ict industry 2015
 
Manejo de situaciones problemáticas
Manejo de situaciones problemáticasManejo de situaciones problemáticas
Manejo de situaciones problemáticas
 
NCTA 5 min presentation (2) PP show
NCTA 5 min presentation (2) PP showNCTA 5 min presentation (2) PP show
NCTA 5 min presentation (2) PP show
 
Share point training branding 2010
Share point training   branding 2010Share point training   branding 2010
Share point training branding 2010
 
La presi¢n arterial y su salud
La presi¢n arterial y su saludLa presi¢n arterial y su salud
La presi¢n arterial y su salud
 
Эвристическая оценка, или как решить проблемы в интерфейсе за час
Эвристическая оценка, или как решить проблемы в интерфейсе за часЭвристическая оценка, или как решить проблемы в интерфейсе за час
Эвристическая оценка, или как решить проблемы в интерфейсе за час
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Как и когда использовать айтрекер на юзабилити тестировании
Как и когда использовать айтрекер на юзабилити тестированииКак и когда использовать айтрекер на юзабилити тестировании
Как и когда использовать айтрекер на юзабилити тестировании
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Управление Рисками в бизнес-анализе
Управление Рисками в бизнес-анализеУправление Рисками в бизнес-анализе
Управление Рисками в бизнес-анализе
 
To requirements and beyond...
To requirements and beyond...To requirements and beyond...
To requirements and beyond...
 

Ähnlich wie Lessons learnt from the 2012 cyber security audit of Western Australian State Government Agencies

Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowIBM Security
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceZubair Baig
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Government
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docxstandfordabbot
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack SurvivalSkoda Minotti
 

Ähnlich wie Lessons learnt from the 2012 cyber security audit of Western Australian State Government Agencies (20)

Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion Menace
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Secure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate CollegeSecure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate College
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
 

Kürzlich hochgeladen

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Kürzlich hochgeladen (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Lessons learnt from the 2012 cyber security audit of Western Australian State Government Agencies

  • 1. Edith Cowan University Security Research Institute Lessons learnt from the OAG audits of State Government Agencies Andrew W d A d Woodward d Security Research Institute Copyright 2012 - Security Research Institute, Edith Cowan University
  • 2. Edith Cowan University Security Research Institute Agenda • Results of current and previous audits • What we did and how we did it • Impact of audits on cyber security • Lessons learned • A few facts about the threat landscape • What role the CUA? • Do we need a State CIO? • Conclusion Copyright 2012 - Security Research Institute, Edith Cowan University
  • 3. Edith Cowan University Security Research Institute OAG cyber audit – key questions • Has the agency conducted risk assessments for cyber threats? • Is there a security policy and/or framework that consider cyber th t ? id b threats? • Are controls in place to effectively detect and manage cyber intrusions? • Are incident response p p plans and recovery y processes in place?
  • 4. Edith Cowan University Security Research Institute What we did • Technical controls audit – U d open source t l t scan websites t Used tools to b it to identify ports, services and vulnerabilities – Use of other information gathering tools to identify other servers and information assets – Penetrated selected systems • Human factor audit – Sent spear-phishing emails to target organisation(s) i ti ( ) – USB drops with benign “phone home” code
  • 5. Edith Cowan University Security Research Institute Summary of 2011 audit – results • Fourteen of the 15 agencies we tested failed to detect, detect prevent or respond to our hostile scans of their Internet sites. • W accessed the i t We d th internal networks of three l t k f th agencies without detection, using identified vulnerabilities f l biliti from our scans. W did not t t th We t test the identified vulnerabilities at the other 12 agencies. • Eight agencies plugged in and activated the USBs we left lying around.
  • 6. Edith Cowan University Security Research Institute Summary of 2011 audit - results • Twelve of the 15 agencies had not recognised and addressed cyber threats from the Internet or social engineering techniques in their security policies. • Ni agencies h d not carried out risk Nine i had t i d t i k assessments to determine their potential exposure to t t external or internal attacks. l i t l tt k • Seven agencies did not have incident response plans or procedures for managing cyber threats from the Internet and social engineering.
  • 7. Edith Cowan University Security Research Institute Summary of 2012 Audit • In one agency we identified a vulnerability in their online payment system that would allow fraud to be committed • I another agency we uploaded non-malicious fil In th l d d li i files to their web server • We identified three significant cross-site scripting (XSS) vulnerabilities on three of the agencies’ web servers. The web content management systems for each of these agencies were also identified
  • 8. Edith Cowan University Security Research Institute Summary of 2012 Audit • Two agencies were potentially vulnerable to SQL injection (not tested) • At one agency we obtained personal and sensitive information of 17 employees from scans of web servers • O agency had not applied any software updates One h d li d f d to its web server for more than two and a half years. As A a result, this particular server h d h d d of l hi i l had hundreds f vulnerabilities, some of these could provide system level access t servers, while others allowed th l l to hil th ll d the interception of information
  • 9. Edith Cowan University Security Research Institute Summary of 2012 audit • Three other agencies also failed to apply software updates leaving them vulnerable to some exploits exploits. • USB sticks were left at agencies (again) and were activated b several agencies. H ti t d by l i However, th these were blocked by ServiceNet. • ServiceNet reported traffic from within government networks attempting to establish external connections which were automatically denied. • Some USBs did phone home successfully from p y private addresses (again)...
  • 10. Edith Cowan University Security Research Institute Summary of 2012 audit • Spear phishing emails were sent to one agency, and within minutes of sending out the email we received an autoreply confirming that the email had passed through protective filtering services and was reaching email in-boxes. • Th email was only sent t one agency h The il l t to however there were many employees that clicked on the link from different agencies within one d f diff t i ithi day.
  • 11. Edith Cowan University Security Research Institute Impact of audits • IPS capability has now been implemented by ServiceNet, ServiceNet providing protection for a number of agencies and blocking nuisance traffic • Awareness of social engineering has been raised • The new ISMS specific CUA references the cyber audit and li di d lists vendors who can assist with relevant d h i ih l issues: “Recent Auditor General reports (June 2011) concluded generally that agencies had failed to take a risk-based approach to identifying and managing cyber threats, and to meet or implement g g g y , p good ppractice guidance and standards for computer security.”
  • 12. Edith Cowan University Security Research Institute The most feared object in WA? Buyers Guide – Information Security Management Services: CS14998
  • 13. Edith Cowan University Security Research Institute Lessons learned • Patching, patching, patching! • Governance – Lack of or flaw in tech control can often be of, flaw, traced back to governance issues • Information security management -> risk > management – Where are the information assets? – Who owns them? – Have cyber specific threats been identified?
  • 14. Edith Cowan University Security Research Institute Lessons learned (cont) • Policy – lack of (cyber incident policy) – lacking – who to report to and when g p – lack of review phase • Over reliance / focus on technical controls – DSD list (top 4 are technical) – CUA (testing services category technically focused) • People continue to be the softest target – User education No. 8 on the DSD list...
  • 15. Edith Cowan University Security Research Institute Tech is not the answer you seek “The more sophisticated the technology, the more vulnerable it i t primitive attack. l bl is to i iti tt k People often overlook the obvious.” Tom Baker as Doctor Wh i Th Pirate Pl T B k D Who in The Pi Planet (19 8) (1978)
  • 16. Edith Cowan University Security Research Institute Threat landscape Source: http://www.mandiant.com/threat-landscape/
  • 17. Edith Cowan University Security Research Institute Source: http://www.mandiant.com/threat-landscape/
  • 18. Edith Cowan University Security Research Institute New challenges • BYOD and cloud bring new challenges to ISM in general, and i state government i l d in t t t agencies – Multinational banned BYOD, then found they had 7000 in the o ga sa o ad 000 e organisation... • An increasing shift towards targeting the human factor not the tech factor, – Being reported increasingly in cyber security briefs
  • 19. Edith Cowan University Security Research Institute The weakest link...
  • 20. Edith Cowan University Security Research Institute Suggestions • Increase security education training and awareness programs (SETA) • Follow ISO 27000 cyclical approach to ISM: Plan, Do, Check, Act • Implement risk management as a subsidiary of information security management – Identification and ranking of information assets; Identify owner of information assets • Metrics and measures!!! While it works, security is y seen as a cost, not a benefit...
  • 21. Edith Cowan University Security Research Institute Common Use Agreement • Pro’s – Li it who can provide services (/idi t filt on) Limits h id i (/idiot filter ) – Provides consistency to agencies seeking services – Th Information Security Management section contains a The I f ti S it M t ti t i link to the cyber health check spreadsheet – very clever! • C Cons – “Testing Services” category focuses on tech too much: not as holistic as it could b ? t h li ti ld be? – Evidence found in audits would suggest that the previous CUA wasn’t working, will this one be any better? wasn t working
  • 22. Edith Cowan University Security Research Institute State Office of the CIO • Audit has played a role in improving Info Sec across WA agencies i • It is a useful tool to “prompt” agencies to prompt improve their security • Wh t if they don’t k What th d ’t know h ? how? • Smaller agencies do not have the resources g that larger agencies / corporations possess • They are held up to a standard which doesn’t doesn t exist (fair criticism)
  • 23. Edith Cowan University Security Research Institute State Office of the CIO • Finance currently leading the cyber charge, and th CUA providing h lth check i good, d the idi health h k is d but is this the aim of this function? • Would a central agency which creates a standard and provides advice to agencies on ISM improve security?
  • 24. Edith Cowan University Security Research Institute Conclusion • Overall, cyber security is good - always room for improvement • Most organisations overly reliant on technical controls – need more f t l d focus on people and policy l d li • There appears to be a disconnect between what the government is saying and what agencies are hearing - a State cyber security standard or Office of the CIO may be helpful • Blue USB thumb drives are to be feared Copyright 2012 - Security Research Institute, Edith Cowan University
  • 25. Edith Cowan University Security Research Institute The end? • Questions or comments? • Contact the Security Research Institute for y further information: e: sri@ecu edu au sri@ecu.edu.au p: 08 6304 5176