SlideShare ist ein Scribd-Unternehmen logo
1 von 56
BEST PRACTICES TO PROACTIVELY
PREVENT, CONTAIN AND RESPOND
TO A RANSOMWARE ATTACK
Prof. Avishai Wool, CTO, AlgoSec
AGENDA
1. Structure of an ransomware attack
2. Back to Basics: Reducing the attack surface
3. Network segmentation and security zones
4. Managing zoned networks with AlgoSec
2
1. STRUCTURE OF A RANSOMWARE ATTACK
3
HOW?
1. Deliver exploits to 1st victim computer
2. Repeat per victim computer:
• Encrypt file system
• Encrypt accessible networked file shares
• Move laterally: explore the network
• Deliver exploits to next victim via network
3. Wait for victim to call
4. Collect ransom
5. Supply decryption key “Advanced Persistent Threat”, Wikipedia
4
1ST VICTIM: ATTACK TECHNIQUES (PARTIAL LIST)
• Email attachment
• Send a malicious email attachment
• Browser Drive-By-Download
• Host the malicious content on a website
• “Water-hole” technique
• Compromise a website the victim likely to visit
• Social Engineering
• Fool someone to do it for you
• Mobile malware
• Spread a malicious mobile application
5
EXPLORE THE COMPROMISED NETWORK
• Encrypting network shares:
Requires network access from victim to file system
Produces (unusual) network traffic
• Move Laterally:
• Find more devices, gain more access, encrypt more interesting data
Requires network access from victim1 to victim2 to …
Produces (unusual) network traffic
E.g., WannaCry used the infamous SMB ports
TCP/445, UDP/137-138, TCP/139
6
STEPPING STONES
7
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
Step 0
7
STEPPING STONES
8
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
Step 0
Step 1
8
STEPPING STONES
9
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
Step 0
Step 1 Step 2 Step 3
9
STEPPING STONES
1
0
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
Step 0
Step 1 Step 2 Step 3
Pay $$$$ or lose data
10
2. BACK TO BASICS: REDUCING THE ATTACK
SURFACE
11
THE FIRST STEP IS THE HARDEST
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
• Most ingenious step (social engineering, clever technical exploit delivery, …)
• Much of the attack is happening outside of your control
• Requires fancy defense technologies to mitigate
12
MAKE LATERAL STEPS HARDER FOR ATTACKER!
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
Step 1 Step 2 Step 3
13
LATERAL STEPS
• The attacker is now on your turf
• Use your advantages:
• Control your network
• Know what traffic is usual and what is not
14
UNUSUAL – IN THE USUAL WAYS
• Lateral traffic is unusual – in the usual ways
• Communicating parties that never communicate
• Protocols & ports that are never used across security zones
• Firewalls are really good at blocking such traffic … as long as:
• There are firewalls in the traffic path
• The firewalls are properly configured
15
3. NETWORK SEGMENTATION AND SECURITY
ZONES
16
RECOMMENDATION #1: SEGMENTATION
• Define network zones
• Place firewalls to filter traffic between zones
• Write restrictive policies for traffic between zones
17
USE TECHNOLOGY YOU KNOW WELL
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
18
SEGMENT THE NETWORK: INTERNAL FIREWALLS
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
• Place internal firewalls between network zones
• Use SDN virtualization technologies to filter traffic inside data center
19
ZONES FOR HUMANS
• Humans are the weakest link (especially as 1st victim)
• Systems they touch directly are at risk
• Usual communication patterns:
• Desktop/Laptop  Server
• Server  Server
• Desktops don’t communicate with other desktops
• Servers don’t initiate connections to desktops
• Desktops only mount certain network shares – not all and not always
20
RECOMMENDATION #2: HUMAN-ACCESS ZONES
• Desktops in separate zones from servers
• Firewalls between human-access zones and server zones
• Keep different departments in separate zones
• Keep file servers / network share servers in separate zones
21
RECOMMENDATION #3: SENSITIVE DATA ZONES
• Some types of data are more sensitive
• Credit card data (PCI regulation)
• Personally Identifiable Information (GLBA, privacy laws)
• Medical data (HIPAA)
• Financial data (SOX, etc)
• Ransomware encryption of personal or PCI data: equivalent to theft
• Regulatory implications
• Keep servers with sensitive data in separate zones
22
POLICY IN A SEGMENTED NETWORK
• Define the segmentation policy as a matrix:
Internal
Network
DMZ Peer’s
DMZ
23
ZOOM IN: FROM/TO THE PEER DMZ
Internal
Network
DMZ Peer’s
DMZ
24
POLL
How many firewalled zones segment your network?
1. Flat, non segmented network
2. 2-3 zones
3. 4-10 zones
4. More than 10 zones
25
4. MANAGING ZONED NETWORKS WITH
ALGOSEC
26
WORKING WITH A SEGMENTED NETWORK
• Preparation:
• Identify the network segments
• Create a segmentation policy matrix (spreadsheet)
• Place internal firewalls / virtualized filters between zones
• Continuous Compliance
• Ensure that firewalls enforce the segmentation policy
• Change Requests
• Identify all the firewalls that need to be modified
• What-if proactive risk check against segmentation policy
27
IMPORT SEGMENTATION POLICY SPREADSHEET
28
CONTINUOUS COMPLIANCE
29
• Daily analysis of all
firewalls
CONTINUOUS COMPLIANCE
30
• Automatically check
segmentation policy
CONTINUOUS COMPLIANCE
31
• + best-practices
knowledge base
MAKING A CHANGE REQUEST
32
AUTOMATICALLY IDENTIFY DEVICES TO MODIFY
2 traditional firewalls
separate network into zones
33
AUTOMATICALLY IDENTIFY DEVICES TO MODIFY
34
VMware NSX firewall filters
all traffic inside the
datacenter
EXPLORE PATH DETAILS
35
WHAT-IF RISK CHECK
• How were the risks checked?
36
WHAT-IF RISK CHECK
37
• How were the risks checked?
• Network segmentation matrix!
WHAT-IF RISK CHECK
38
• Automatically creates ‘Work Order’ per device
• Implements new rules
… Details in another webinar!
BUSINESS DRIVEN INCIDENT RESPONSE
AN INCIDENT STARTS WITH DETECTION
• Humans call Cyber Operations Center (COC):
• “My computer locked up” / “I see a request for ransom”
• Technological detectors, with different methodologies:
• Heavy file system activity
• Network-based, host-based activity alerts
• Etc.…
 Evidence of malicious activity can be observed in logs
40
BUSINESS-DRIVEN TRIAGE
• Identify impacted business processes
• Which business applications rely on impacted systems?
• How business-critical are these applications?
• Who are the business owners?
• Identify data sensitivity
• Do impacted applications handle sensitive data?
• Is impacted system a “stepping stone” to sensitive data?
• Can impacted system exfiltrate data?
• Triage outcomes:
• Urgency of mitigation (now/tonight/change-control-window)
• Aggressiveness of mitigation (filter/disconnect/shutdown/patch)
41
BUSINESS-DRIVEN CONSIDERATIONS
• Weigh 2 types of risk:
• Security risk: damage of attack until it is mitigated
• Operational risk: downtime during mitigation + unintended side effects
• Business criticality primarily affects the operational risk
• Data sensitivity primarily affects the security risk
• … also regulatory compliance and reporting requirements
REACHABILITY CONSIDERATIONS
• The ransomware-impacted system is “0wned”
• All data on that system is encrypted
• … but network defenses are still in place:
• East-West traffic filters (in a segmented datacenter)
• North-South traffic filters (perimeter firewalls)
• Can impacted system connect to more sensitive systems?
• Lateral movement
• Stepping stone
• Contain:
• Remediate through automatic isolation of
compromised servers from network
• Report:
• Report incident to relevant teams
• Maintain audit trail of actions taken
RESPONSE: TAKING ACTION
44
• Restore:
• Either restore data from backup
• … Or pay the ransom
SIEM INTEGRATION WITH ALGOSEC
ALGOSEC APPS FOR INCIDENT RESPONSE
• Splunk/QRadar App for Incident Response based on AlgoSec capabilities
• To be used as-is or incorporated into other SIEM apps
46
47
48
AlgoSec App adds an action
menu to all IP address fields
49
- Critical business process?
(identify business impact, set priority)
- Who to report to?
50
Can reach sensitive zone?
 Stepping stone
 Regulatory impact
 Reporting requirements
• From impacted system
• To sensitive zone
10.3.3.3
51
52
53
SUMMARY
• Take control your turf: Make lateral steps within your network harder
for attackers
• Segment the network
• Segment the users
• Segment sensitive data
• Maintain control
• Intelligent, structured process for change requests
• Proactively assess risk
• Ensure continuous compliance
• Use Business-Driven Incident Response
54
MORE RESOURCES
55
THANK YOU!
Questions can be emailed to
marketing@algosec.com

Weitere ähnliche Inhalte

Was ist angesagt?

2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)AlgoSec
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAlgoSec
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAlgoSec
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesAlgoSec
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...AlgoSec
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesAlgoSec
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivityshira koper
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...AlgoSec
 
SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network finalAlgoSec
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...AlgoSec
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationAlgoSec
 
compliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarcompliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarAlgoSec
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...AlgoSec
 
Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Maytal Levi
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarAlgoSec
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceAlgoSec
 
AlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarAlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarMaytal Levi
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloudAlgoSec
 

Was ist angesagt? (20)

2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’ts
 
Taking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changesTaking the fire drill out of making firewall changes
Taking the fire drill out of making firewall changes
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy Changes
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network final
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
compliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarcompliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinar
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 
Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
 
AlgoSec Application Migration Webinar
AlgoSec Application Migration WebinarAlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
 
best practices-managing_security_in_the hybrid cloud
 best practices-managing_security_in_the hybrid cloud best practices-managing_security_in_the hybrid cloud
best practices-managing_security_in_the hybrid cloud
 

Ähnlich wie Ransomware Attack: Best Practices to proactively prevent contain and respond

Ähnlich wie Ransomware Attack: Best Practices to proactively prevent contain and respond (20)

Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
DDOS ATTACKS
DDOS ATTACKSDDOS ATTACKS
DDOS ATTACKS
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Seminar
SeminarSeminar
Seminar
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Divyanshu.pptx
Divyanshu.pptxDivyanshu.pptx
Divyanshu.pptx
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
CSC437-Fall2013-Module-7-Firewalls-IDS.pdf
CSC437-Fall2013-Module-7-Firewalls-IDS.pdfCSC437-Fall2013-Module-7-Firewalls-IDS.pdf
CSC437-Fall2013-Module-7-Firewalls-IDS.pdf
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
 

Mehr von AlgoSec

The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinarAlgoSec
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...AlgoSec
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
Cloud migrations made simpler safe secure and successful migrations
Cloud migrations made simpler   safe secure and successful migrationsCloud migrations made simpler   safe secure and successful migrations
Cloud migrations made simpler safe secure and successful migrationsAlgoSec
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to executionAlgoSec
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarAlgoSec
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...AlgoSec
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...AlgoSec
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...AlgoSec
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solutionAlgoSec
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteAlgoSec
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation finalAlgoSec
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentAlgoSec
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationAlgoSec
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...AlgoSec
 

Mehr von AlgoSec (20)

The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinar
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Cloud migrations made simpler safe secure and successful migrations
Cloud migrations made simpler   safe secure and successful migrationsCloud migrations made simpler   safe secure and successful migrations
Cloud migrations made simpler safe secure and successful migrations
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management Suite
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organization
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 

Kürzlich hochgeladen

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Ransomware Attack: Best Practices to proactively prevent contain and respond

  • 1. BEST PRACTICES TO PROACTIVELY PREVENT, CONTAIN AND RESPOND TO A RANSOMWARE ATTACK Prof. Avishai Wool, CTO, AlgoSec
  • 2. AGENDA 1. Structure of an ransomware attack 2. Back to Basics: Reducing the attack surface 3. Network segmentation and security zones 4. Managing zoned networks with AlgoSec 2
  • 3. 1. STRUCTURE OF A RANSOMWARE ATTACK 3
  • 4. HOW? 1. Deliver exploits to 1st victim computer 2. Repeat per victim computer: • Encrypt file system • Encrypt accessible networked file shares • Move laterally: explore the network • Deliver exploits to next victim via network 3. Wait for victim to call 4. Collect ransom 5. Supply decryption key “Advanced Persistent Threat”, Wikipedia 4
  • 5. 1ST VICTIM: ATTACK TECHNIQUES (PARTIAL LIST) • Email attachment • Send a malicious email attachment • Browser Drive-By-Download • Host the malicious content on a website • “Water-hole” technique • Compromise a website the victim likely to visit • Social Engineering • Fool someone to do it for you • Mobile malware • Spread a malicious mobile application 5
  • 6. EXPLORE THE COMPROMISED NETWORK • Encrypting network shares: Requires network access from victim to file system Produces (unusual) network traffic • Move Laterally: • Find more devices, gain more access, encrypt more interesting data Requires network access from victim1 to victim2 to … Produces (unusual) network traffic E.g., WannaCry used the infamous SMB ports TCP/445, UDP/137-138, TCP/139 6
  • 11. 2. BACK TO BASICS: REDUCING THE ATTACK SURFACE 11
  • 12. THE FIRST STEP IS THE HARDEST Financial Database HVAC Control Partner Network Procurement Department Internet • Most ingenious step (social engineering, clever technical exploit delivery, …) • Much of the attack is happening outside of your control • Requires fancy defense technologies to mitigate 12
  • 13. MAKE LATERAL STEPS HARDER FOR ATTACKER! Financial Database HVAC Control Partner Network Procurement Department Internet Step 1 Step 2 Step 3 13
  • 14. LATERAL STEPS • The attacker is now on your turf • Use your advantages: • Control your network • Know what traffic is usual and what is not 14
  • 15. UNUSUAL – IN THE USUAL WAYS • Lateral traffic is unusual – in the usual ways • Communicating parties that never communicate • Protocols & ports that are never used across security zones • Firewalls are really good at blocking such traffic … as long as: • There are firewalls in the traffic path • The firewalls are properly configured 15
  • 16. 3. NETWORK SEGMENTATION AND SECURITY ZONES 16
  • 17. RECOMMENDATION #1: SEGMENTATION • Define network zones • Place firewalls to filter traffic between zones • Write restrictive policies for traffic between zones 17
  • 18. USE TECHNOLOGY YOU KNOW WELL Financial Database HVAC Control Partner Network Procurement Department Internet 18
  • 19. SEGMENT THE NETWORK: INTERNAL FIREWALLS Financial Database HVAC Control Partner Network Procurement Department Internet • Place internal firewalls between network zones • Use SDN virtualization technologies to filter traffic inside data center 19
  • 20. ZONES FOR HUMANS • Humans are the weakest link (especially as 1st victim) • Systems they touch directly are at risk • Usual communication patterns: • Desktop/Laptop  Server • Server  Server • Desktops don’t communicate with other desktops • Servers don’t initiate connections to desktops • Desktops only mount certain network shares – not all and not always 20
  • 21. RECOMMENDATION #2: HUMAN-ACCESS ZONES • Desktops in separate zones from servers • Firewalls between human-access zones and server zones • Keep different departments in separate zones • Keep file servers / network share servers in separate zones 21
  • 22. RECOMMENDATION #3: SENSITIVE DATA ZONES • Some types of data are more sensitive • Credit card data (PCI regulation) • Personally Identifiable Information (GLBA, privacy laws) • Medical data (HIPAA) • Financial data (SOX, etc) • Ransomware encryption of personal or PCI data: equivalent to theft • Regulatory implications • Keep servers with sensitive data in separate zones 22
  • 23. POLICY IN A SEGMENTED NETWORK • Define the segmentation policy as a matrix: Internal Network DMZ Peer’s DMZ 23
  • 24. ZOOM IN: FROM/TO THE PEER DMZ Internal Network DMZ Peer’s DMZ 24
  • 25. POLL How many firewalled zones segment your network? 1. Flat, non segmented network 2. 2-3 zones 3. 4-10 zones 4. More than 10 zones 25
  • 26. 4. MANAGING ZONED NETWORKS WITH ALGOSEC 26
  • 27. WORKING WITH A SEGMENTED NETWORK • Preparation: • Identify the network segments • Create a segmentation policy matrix (spreadsheet) • Place internal firewalls / virtualized filters between zones • Continuous Compliance • Ensure that firewalls enforce the segmentation policy • Change Requests • Identify all the firewalls that need to be modified • What-if proactive risk check against segmentation policy 27
  • 28. IMPORT SEGMENTATION POLICY SPREADSHEET 28
  • 29. CONTINUOUS COMPLIANCE 29 • Daily analysis of all firewalls
  • 30. CONTINUOUS COMPLIANCE 30 • Automatically check segmentation policy
  • 31. CONTINUOUS COMPLIANCE 31 • + best-practices knowledge base
  • 32. MAKING A CHANGE REQUEST 32
  • 33. AUTOMATICALLY IDENTIFY DEVICES TO MODIFY 2 traditional firewalls separate network into zones 33
  • 34. AUTOMATICALLY IDENTIFY DEVICES TO MODIFY 34 VMware NSX firewall filters all traffic inside the datacenter
  • 36. WHAT-IF RISK CHECK • How were the risks checked? 36
  • 37. WHAT-IF RISK CHECK 37 • How were the risks checked? • Network segmentation matrix!
  • 38. WHAT-IF RISK CHECK 38 • Automatically creates ‘Work Order’ per device • Implements new rules … Details in another webinar!
  • 40. AN INCIDENT STARTS WITH DETECTION • Humans call Cyber Operations Center (COC): • “My computer locked up” / “I see a request for ransom” • Technological detectors, with different methodologies: • Heavy file system activity • Network-based, host-based activity alerts • Etc.…  Evidence of malicious activity can be observed in logs 40
  • 41. BUSINESS-DRIVEN TRIAGE • Identify impacted business processes • Which business applications rely on impacted systems? • How business-critical are these applications? • Who are the business owners? • Identify data sensitivity • Do impacted applications handle sensitive data? • Is impacted system a “stepping stone” to sensitive data? • Can impacted system exfiltrate data? • Triage outcomes: • Urgency of mitigation (now/tonight/change-control-window) • Aggressiveness of mitigation (filter/disconnect/shutdown/patch) 41
  • 42. BUSINESS-DRIVEN CONSIDERATIONS • Weigh 2 types of risk: • Security risk: damage of attack until it is mitigated • Operational risk: downtime during mitigation + unintended side effects • Business criticality primarily affects the operational risk • Data sensitivity primarily affects the security risk • … also regulatory compliance and reporting requirements
  • 43. REACHABILITY CONSIDERATIONS • The ransomware-impacted system is “0wned” • All data on that system is encrypted • … but network defenses are still in place: • East-West traffic filters (in a segmented datacenter) • North-South traffic filters (perimeter firewalls) • Can impacted system connect to more sensitive systems? • Lateral movement • Stepping stone
  • 44. • Contain: • Remediate through automatic isolation of compromised servers from network • Report: • Report incident to relevant teams • Maintain audit trail of actions taken RESPONSE: TAKING ACTION 44 • Restore: • Either restore data from backup • … Or pay the ransom
  • 46. ALGOSEC APPS FOR INCIDENT RESPONSE • Splunk/QRadar App for Incident Response based on AlgoSec capabilities • To be used as-is or incorporated into other SIEM apps 46
  • 47. 47
  • 48. 48
  • 49. AlgoSec App adds an action menu to all IP address fields 49
  • 50. - Critical business process? (identify business impact, set priority) - Who to report to? 50
  • 51. Can reach sensitive zone?  Stepping stone  Regulatory impact  Reporting requirements • From impacted system • To sensitive zone 10.3.3.3 51
  • 52. 52
  • 53. 53
  • 54. SUMMARY • Take control your turf: Make lateral steps within your network harder for attackers • Segment the network • Segment the users • Segment sensitive data • Maintain control • Intelligent, structured process for change requests • Proactively assess risk • Ensure continuous compliance • Use Business-Driven Incident Response 54
  • 56. THANK YOU! Questions can be emailed to marketing@algosec.com

Hinweis der Redaktion

  1. screenshot
  2. screenshot
  3. screenshot