SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Detecting and Preventing
the Insider Threat
Mike Saunders
Hardwater Information Security
About Mike
18 Years in IT
9 Years in Security
CISSP, GPEN, GWAPT, GCIH
Speaker: DerbyCon, BSidesMSP, ND IT Symposium,
NDSU CyberSecurity Conference
Defining the threat
Mistakes
Sensitive data exposed
Unintentional data destruction or contamination
Outages caused by misconfigurations
Malware outbreaks
Defining the threat
Bad actors
Theft of IP, sensitive data, $$$
Insider trading
Intentional data corruption, deletion
Denial of Service
Terry Childs - 2008
The Insider Threat
Verizion 2016 DBIR
≈ 18% of all breaches due to insider actions
riskbasedsecurity.com
32% of all exposed records in 2015 due to insider
mistake. 191M in one event.
≈ 49% of all exposed records due to all insider actions
’15 Exposed Records by Threat Vector
riskbasedsecurity.com (2015 statistics)
Insider Threat Statistics
2015 Verizon DBIR
Prevention
Prevention - web
Block outbound web access by default
Require all users to go through web proxy
Block access to external email providers
Ensure local/regional ISP mail systems are also
blocked
Prevention - web
Block access to known file sharing sites
Use proxy vendor classifications
Block access to all uncategorized websites
Prevent egress from servers
Prevention - network
Deny by default
Ensure all egress avenues are blocked, including
SSH, telnet, SMB, CIFS, HTTP/HTTPS
Grant unrestricted egress by exception only
Tie to user ID, not IP
Disable split tunneling on VPN connections
Prevention - applications
Consider whitelisting technologies to prevent unknown
executables from running
Significant management overhead initially
Worth it in the long run
Removable Media
Deny access to use removable media
USB AND CD/DVD-R
Permit by authorized exception only
Regularly review removable media authorizations
Encrypt all removable media
Prevention - physical
Restrict access to sensitive ares
Document storage
Datacenter & network closets
Physical security controls
Monitor for abnormal activity
Data Classification
Implement data classification scheme
Identify what data is sensitive
Separate storage of sensitive and non-sensitive data
A word about DLP
DLP is not a panacea
Useless without a data classification program
You MUST perform HTTPS inspection
What about encrypted zip in email?
A meme about DLP
Privilege Management
Restrict access to local AND directory administrator groups
Separate accounts for admin and daily use
Regularly review access to admin groups
Group users by job function
Regularly x-ref group membership to job functions
Privilege review whenever employees change roles
Restrict Access
Deny access to sensitive data by default
Provision access to data by group / role
Individual access by exception only
Monitoring
Monitoring
Email
Develop reporting for outbound email usage by user
Network / Web
Develop reporting for outbound data usage by user
Compare outbound reports against baseline
Look for spikes in usage; review
More on monitoring
What about packets bouncing off the firewall?
1 IP to an external IP on many ports or to many IPs
may be sign of probing
Some attacks exfiltrate over DNS
https://www.sans.org/reading-room/whitepapers/
dns/detecting-dns-tunneling-34152
Tuning for monitoring
IDS/IPS - DO NOT enable all the things!
Details will be lost in the noise
Test in small batches, only enable useful / actionable
alerts
Enable reputational and behavioral blocking on local
client firewalls / AV - i.e. Symantec Sonar
Logging
Send all logs to SIEM
Log all authentication attempts
Both successful and failed
NSA “Spotting the Adversary with Windows Event
Log Monitoring”
Logging
Log access to sensitive data directories
Log firewall activity
Process logging
Consider file integrity management and change request
system
Antivirus
May be ineffective against emerging threats but useful
after the fact
AV alerts from system boot or scheduled scans
should be investigated - something bad is already on
the system
Investigations can x-ref proxy logs to identify
infection vector, subsequent calls to botnet / threat
actor
Hardening systems
Same methods used to prevent against external
threats
Remove “low hanging fruit” for insiders
Disable unnecessary services
Remove unneeded software
Patch quickly, patch often
Share auditing
Routinely scan for file shares
Unprivileged user without special group permissions
Identify shares allowing anonymous or “Authenticated
Users”
Sample each accessible share for unprotected
sensitive data
Education / Resources
SANS: Securing the Human
site:sans.org intext:”insider threat”
https://www.cert.org/insider-threat/research/controls-
and-indicators.cfm
Wrap up
Prevention is key
Restrict privileges
Restrict network egress
Block removable media
Monitor for abnormal behavior
Logging is essential
Review shares for unprotected sensitive data
Educate, educate, educate
Contact
@hardwaterhacker
mike@hardwatersecurity.com
http://hardwatersec.blogspot.com
https://github.com/hardwaterhacker/
Resources
https://www.nsa.gov/ia/_files/app/
spotting_the_adversary_with_windows_event_log_monit
oring.pdf
nmap share scanning
https://nmap.org/nsedoc/scripts/smb-enum-
shares.html
http://pwndizzle.blogspot.com/2013/02/parsing-
nmap-smb-enum-shares-output.html
Resources
nmap -sS --v -oA myshares --script smb-enum-shares
--script-args smbuser=smbuser,smbpass=password -
p445 <range>
nmap -sU -sS -v -oA myShares --script smb-enum-
shares.nse --script-args
smbuser=smbuser,smbpass=password -p U:137,T:
139 <range>
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Zlatibor asseco-fire eye
Zlatibor   asseco-fire eyeZlatibor   asseco-fire eye
Zlatibor asseco-fire eye
Dejan Jeremic
 

Was ist angesagt? (20)

Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Cisa ransomware guide
Cisa ransomware guideCisa ransomware guide
Cisa ransomware guide
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
 
Zlatibor asseco-fire eye
Zlatibor   asseco-fire eyeZlatibor   asseco-fire eye
Zlatibor asseco-fire eye
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration Overview
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by Tictac
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
Think Like a Hacker
Think Like a HackerThink Like a Hacker
Think Like a Hacker
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USM
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero Trust
 

Andere mochten auch

SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distro
Mike Saunders
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
Mike Saunders
 
Dramtic reading assignment english
Dramtic reading assignment englishDramtic reading assignment english
Dramtic reading assignment english
Bradymort9
 
Testailua vaan
Testailua vaanTestailua vaan
Testailua vaan
Tenttu
 

Andere mochten auch (18)

SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distro
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 
SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017
 
Installation log
Installation logInstallation log
Installation log
 
Nhìn ra thế giới để tìm kiếm cơ hội làm giàu cho người việt nam
Nhìn ra thế giới để tìm kiếm cơ hội làm giàu cho người việt namNhìn ra thế giới để tìm kiếm cơ hội làm giàu cho người việt nam
Nhìn ra thế giới để tìm kiếm cơ hội làm giàu cho người việt nam
 
Lovesick Sentimentalism
Lovesick SentimentalismLovesick Sentimentalism
Lovesick Sentimentalism
 
Tenaran Prosperity Challenge Round 2
Tenaran Prosperity Challenge Round 2Tenaran Prosperity Challenge Round 2
Tenaran Prosperity Challenge Round 2
 
Dramtic reading assignment english
Dramtic reading assignment englishDramtic reading assignment english
Dramtic reading assignment english
 
Heterogeneous data transfer and loader
Heterogeneous data transfer and loaderHeterogeneous data transfer and loader
Heterogeneous data transfer and loader
 
Knm dau khoa
Knm dau khoaKnm dau khoa
Knm dau khoa
 
Bi-Layer Tablet Press for Chamunda Pharma Machinery
Bi-Layer Tablet Press for Chamunda Pharma MachineryBi-Layer Tablet Press for Chamunda Pharma Machinery
Bi-Layer Tablet Press for Chamunda Pharma Machinery
 
Ontology oriented concept based clustering
Ontology oriented concept based clusteringOntology oriented concept based clustering
Ontology oriented concept based clustering
 
Customer's Review about AXISS DENTAL
Customer's Review about AXISS DENTALCustomer's Review about AXISS DENTAL
Customer's Review about AXISS DENTAL
 
праздники осени
праздники осенипраздники осени
праздники осени
 
Thermal performance analysis of opaque facades for the different thickness
Thermal performance analysis of opaque facades for the different thicknessThermal performance analysis of opaque facades for the different thickness
Thermal performance analysis of opaque facades for the different thickness
 
Testailua vaan
Testailua vaanTestailua vaan
Testailua vaan
 
B1 l1 3 powerpoint
B1 l1 3 powerpointB1 l1 3 powerpoint
B1 l1 3 powerpoint
 
Es Suficiente la Inversión en Investigación en Pro del mejoramiento energétic...
Es Suficiente la Inversión en Investigación en Pro del mejoramiento energétic...Es Suficiente la Inversión en Investigación en Pro del mejoramiento energétic...
Es Suficiente la Inversión en Investigación en Pro del mejoramiento energétic...
 

Ähnlich wie InsiderThreat-2016NDITS

dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
alex hincapie
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
Rodrigo Piovesana
 

Ähnlich wie InsiderThreat-2016NDITS (20)

dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Firewalls in cryptography
Firewalls in cryptographyFirewalls in cryptography
Firewalls in cryptography
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And Monitor
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
Data security
Data securityData security
Data security
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 

Mehr von Mike Saunders

DetectingSpearPhishingAttacks
DetectingSpearPhishingAttacksDetectingSpearPhishingAttacks
DetectingSpearPhishingAttacks
Mike Saunders
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentation
Mike Saunders
 

Mehr von Mike Saunders (9)

I Want My EIP - Buffer Overflow 101
I Want My EIP - Buffer Overflow 101I Want My EIP - Buffer Overflow 101
I Want My EIP - Buffer Overflow 101
 
BSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshopBSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshop
 
DetectingSpearPhishingAttacks
DetectingSpearPhishingAttacksDetectingSpearPhishingAttacks
DetectingSpearPhishingAttacks
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentation
 
You will be breached
You will be breachedYou will be breached
You will be breached
 
Problems with parameters b sides-msp
Problems with parameters b sides-mspProblems with parameters b sides-msp
Problems with parameters b sides-msp
 

InsiderThreat-2016NDITS