SlideShare ist ein Scribd-Unternehmen logo
1 von 15
1SANS Technology Institute - Candidate for Master of Science Degree 1
Critical Controls Might Have
Prevented the Target Breach
Teri Radichel
May 2016
GSEC, GCIH, GCIA
SANS Technology Institute - Candidate for Master of Science Degree 2
The Target Breach
• Over 40 million credit cards stolen
• Over $200 million in losses
• Over 140 lawsuits
• What happened?
• How could it have been prevented?
• The 20 Critical Controls
SANS Technology Institute - Candidate for Master of Science Degree 3
Reconnaissance
●
Google Search
●
Microsoft case study and vendor list
●
Controls:
– Security Skills Assessment / Training
– Need to Know
●
Result: No useful information for attack
SANS Technology Institute - Candidate for Master of Science Degree 4
Phishing & Malware
• Email sent to Fazio Mechanical
• Malware installed
• Password stolen
• Controls:
– Malware Defenses
– Security Skills Assessment / Training
• Result: Malware fails to get credentials
SANS Technology Institute - Candidate for Master of Science Degree 5
Vendor Portal Compromise
• Stolen credentials access vendor portal
• Controls:
– Boundary Defense: Limit Network
– Account Monitoring / Control
• Result: MFA and network controls
prevent access
SANS Technology Institute - Candidate for Master of Science Degree 6
Lateral Movement
• Installation of network tools
• Scanning and network traversal
• Controls:
– Controlled Admin Privilege
– Secure Network Engineering
– Maintain, Monitor, Analyze Logs
• Result: Anomalous behavior prevented
SANS Technology Institute - Candidate for Master of Science Degree 7
Misconfigured Systems
• Misconfigured systems allow access
• Some passwords left as default
• Controls:
– Secure Configurations
– Account Monitoring & Control
• Result: System cannot be leveraged by
attackers
SANS Technology Institute - Candidate for Master of Science Degree 8
POS System Malware
• SCCM installs malware on POS
systems
• Malware undetectable by virus scanner
• Controls:
– Inventory of Software
– Malware Defenses
• Result: Malware install prevented
SANS Technology Institute - Candidate for Master of Science Degree 9
Incomplete Encryption
• Unencrypted data in memory
• Controls:
– Application Software Security
– Data Protection
• Result: Malware only sees data that was
encrypted at swipe (TRSM)
SANS Technology Institute - Candidate for Master of Science Degree 10
Data Movement In Network
• Ports 139, 443 and 80 open
• Data moved via NetBIOS shares
• Controls
– Secure Configuration
– Secure Network Engineering
– Maintain, Monitor, Analyze Logs
• Result: Data movement prevented
SANS Technology Institute - Candidate for Master of Science Degree 11
Network Tunnels
• ICMP tunnel, crafted PING packets
• Other customized components
• Controls:
– Secure Network Engineering
– Maintain, Monitor, Analyze Logs
• Result: Traffic discovered and blocked
SANS Technology Institute - Candidate for Master of Science Degree 12
Data Exfiltration
• Data moved to compromised servers
around the world
• FTP used to retrieve data
• Controls:
– Data Protection
– Maintain, Monitor, Analyze Logs
• Result: Prevention of data exfiltration
SANS Technology Institute - Candidate for Master of Science Degree 13
Incident Response Failure
• Staff did not respond correctly to alerts
• Controls:
– Security Skills Assessment/Training
– Maintain, Monitor, Analyze Logs
– Incident Response Management
– Pen tests and Red Team exercises
• Result: Response limits damage
SANS Technology Institute - Candidate for Master of Science Degree 14
Credit Cards Sold
• Stolen cards sold on the black market
• Control:
– Data protection
• Result: EMV prevents some use of
stolen card data
• Note: EMV has limitations; better to
prevent loss at source
SANS Technology Institute - Candidate for Master of Science Degree 15
Summary
• Focus on security, not compliance
• Determine risk: likelihood + severity
• Understand anatomy of common
attacks
• Protect critical assets
• Leverage the Critical Controls

Weitere ähnliche Inhalte

Was ist angesagt?

Personal finance and wealth management project report
Personal finance and wealth management project reportPersonal finance and wealth management project report
Personal finance and wealth management project reportMuhammed Ikram
 
A project report on working capital management
A project report on working capital managementA project report on working capital management
A project report on working capital managementBabasab Patil
 
Infosys - Financial Analysis
Infosys - Financial AnalysisInfosys - Financial Analysis
Infosys - Financial AnalysisAkash Dhar
 
A comparative study of financial statements in naaraayani & sons (p) ltd
A comparative study of financial statements in naaraayani & sons (p) ltdA comparative study of financial statements in naaraayani & sons (p) ltd
A comparative study of financial statements in naaraayani & sons (p) ltdShakti Prasad Tiwari
 
A study on effect of liquidity management on profitability with select privat...
A study on effect of liquidity management on profitability with select privat...A study on effect of liquidity management on profitability with select privat...
A study on effect of liquidity management on profitability with select privat...Supriya Mondal
 
Financial Statement Analysis PowerPoint Presentation Slides
Financial Statement Analysis PowerPoint Presentation SlidesFinancial Statement Analysis PowerPoint Presentation Slides
Financial Statement Analysis PowerPoint Presentation SlidesSlideTeam
 
A Comparative study of the Financial Performance of the Axis Bank Ltd & ICICI...
A Comparative study of the Financial Performance of the Axis Bank Ltd & ICICI...A Comparative study of the Financial Performance of the Axis Bank Ltd & ICICI...
A Comparative study of the Financial Performance of the Axis Bank Ltd & ICICI...AsmitaMali3
 
Sip presentation on Karvy
Sip presentation on Karvy Sip presentation on Karvy
Sip presentation on Karvy Ayush0734
 
B006 2010-iaasb-handbook-iaps-1006
B006 2010-iaasb-handbook-iaps-1006B006 2010-iaasb-handbook-iaps-1006
B006 2010-iaasb-handbook-iaps-1006RS NAVARRO
 
svb collapse reasons by techsigma.pdf
svb collapse reasons by techsigma.pdfsvb collapse reasons by techsigma.pdf
svb collapse reasons by techsigma.pdfSachinMenon25
 
A report on Credit Risk Management in Banks
A report on Credit Risk Management in BanksA report on Credit Risk Management in Banks
A report on Credit Risk Management in BanksAnurag Ghosh
 
Jagadeep Reddy_Guidewire Policy Center Testing.DOC
Jagadeep Reddy_Guidewire Policy Center Testing.DOCJagadeep Reddy_Guidewire Policy Center Testing.DOC
Jagadeep Reddy_Guidewire Policy Center Testing.DOCJagadeep Reddy
 
Marketing Strategy of Thane bharat sahakari Bank
Marketing Strategy of Thane bharat sahakari BankMarketing Strategy of Thane bharat sahakari Bank
Marketing Strategy of Thane bharat sahakari BankRahul Jain
 
Financial crisis in Iceland
Financial crisis in IcelandFinancial crisis in Iceland
Financial crisis in IcelandUsman Riaz
 

Was ist angesagt? (20)

Bank branch audit
Bank branch auditBank branch audit
Bank branch audit
 
Personal finance and wealth management project report
Personal finance and wealth management project reportPersonal finance and wealth management project report
Personal finance and wealth management project report
 
A project report on working capital management
A project report on working capital managementA project report on working capital management
A project report on working capital management
 
Infosys - Financial Analysis
Infosys - Financial AnalysisInfosys - Financial Analysis
Infosys - Financial Analysis
 
A comparative study of financial statements in naaraayani & sons (p) ltd
A comparative study of financial statements in naaraayani & sons (p) ltdA comparative study of financial statements in naaraayani & sons (p) ltd
A comparative study of financial statements in naaraayani & sons (p) ltd
 
A study on effect of liquidity management on profitability with select privat...
A study on effect of liquidity management on profitability with select privat...A study on effect of liquidity management on profitability with select privat...
A study on effect of liquidity management on profitability with select privat...
 
Financial Statement Analysis PowerPoint Presentation Slides
Financial Statement Analysis PowerPoint Presentation SlidesFinancial Statement Analysis PowerPoint Presentation Slides
Financial Statement Analysis PowerPoint Presentation Slides
 
CREDIT APPRESIAL
CREDIT APPRESIALCREDIT APPRESIAL
CREDIT APPRESIAL
 
A Comparative study of the Financial Performance of the Axis Bank Ltd & ICICI...
A Comparative study of the Financial Performance of the Axis Bank Ltd & ICICI...A Comparative study of the Financial Performance of the Axis Bank Ltd & ICICI...
A Comparative study of the Financial Performance of the Axis Bank Ltd & ICICI...
 
Sip presentation on Karvy
Sip presentation on Karvy Sip presentation on Karvy
Sip presentation on Karvy
 
B006 2010-iaasb-handbook-iaps-1006
B006 2010-iaasb-handbook-iaps-1006B006 2010-iaasb-handbook-iaps-1006
B006 2010-iaasb-handbook-iaps-1006
 
svb collapse reasons by techsigma.pdf
svb collapse reasons by techsigma.pdfsvb collapse reasons by techsigma.pdf
svb collapse reasons by techsigma.pdf
 
A report on Credit Risk Management in Banks
A report on Credit Risk Management in BanksA report on Credit Risk Management in Banks
A report on Credit Risk Management in Banks
 
Syndicate bank
Syndicate bankSyndicate bank
Syndicate bank
 
Banking Industry
Banking IndustryBanking Industry
Banking Industry
 
Jagadeep Reddy_Guidewire Policy Center Testing.DOC
Jagadeep Reddy_Guidewire Policy Center Testing.DOCJagadeep Reddy_Guidewire Policy Center Testing.DOC
Jagadeep Reddy_Guidewire Policy Center Testing.DOC
 
Functional Audit
Functional AuditFunctional Audit
Functional Audit
 
Psl
PslPsl
Psl
 
Marketing Strategy of Thane bharat sahakari Bank
Marketing Strategy of Thane bharat sahakari BankMarketing Strategy of Thane bharat sahakari Bank
Marketing Strategy of Thane bharat sahakari Bank
 
Financial crisis in Iceland
Financial crisis in IcelandFinancial crisis in Iceland
Financial crisis in Iceland
 

Andere mochten auch

Recent changes to the 20 critical controls
Recent changes to the 20 critical controlsRecent changes to the 20 critical controls
Recent changes to the 20 critical controlsEnclaveSecurity
 
Solving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaSolving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaJohn Gilligan
 
AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016Teri Radichel
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 
Trading Target Stock after the Data Breach
Trading Target Stock after the Data BreachTrading Target Stock after the Data Breach
Trading Target Stock after the Data BreachInvestingTips
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachUlf Mattsson
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills AuditVilius Benetis
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedMike Chapple
 
Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)Raul Soto
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controlsEnclaveSecurity
 
Data breach at Target, demystified.
Data breach at Target, demystified.Data breach at Target, demystified.
Data breach at Target, demystified.Cyphort
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 

Andere mochten auch (17)

Recent changes to the 20 critical controls
Recent changes to the 20 critical controlsRecent changes to the 20 critical controls
Recent changes to the 20 critical controls
 
Solving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaSolving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity Dilemma
 
AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
Trading Target Stock after the Data Breach
Trading Target Stock after the Data BreachTrading Target Stock after the Data Breach
Trading Target Stock after the Data Breach
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
 
Cyber_Defense_Presentation
Cyber_Defense_PresentationCyber_Defense_Presentation
Cyber_Defense_Presentation
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons Learned
 
Company Product Sheet
Company Product SheetCompany Product Sheet
Company Product Sheet
 
Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)Network Infrastructure Validation Conference @UPRA (2003)
Network Infrastructure Validation Conference @UPRA (2003)
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
Target PDF
Target PDFTarget PDF
Target PDF
 
Ispe Article
Ispe ArticleIspe Article
Ispe Article
 
Data breach at Target, demystified.
Data breach at Target, demystified.Data breach at Target, demystified.
Data breach at Target, demystified.
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 

Ähnlich wie Critical Controls Might Have Prevented the Target Breach

The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemLancope, Inc.
 
Greenbone vulnerability assessment - Networkshop44
Greenbone vulnerability assessment  - Networkshop44Greenbone vulnerability assessment  - Networkshop44
Greenbone vulnerability assessment - Networkshop44Jisc
 
Cyber security for system design
Cyber security for system designCyber security for system design
Cyber security for system designTom Kaczmarek
 
Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaShivamSharma909
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineerShivamSharma909
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application SecurityJim Kaplan CIA CFE
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001eaiti
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Penetration testing experience at the University of Worcester
Penetration testing experience at the University of WorcesterPenetration testing experience at the University of Worcester
Penetration testing experience at the University of WorcesterJisc
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankGreat Bay Software
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxAlfredObia1
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceSPAN Infotech (India) Pvt Ltd
 
2020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 92020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 9FRSecure
 

Ähnlich wie Critical Controls Might Have Prevented the Target Breach (20)

The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch System
 
Greenbone vulnerability assessment - Networkshop44
Greenbone vulnerability assessment  - Networkshop44Greenbone vulnerability assessment  - Networkshop44
Greenbone vulnerability assessment - Networkshop44
 
Cyber security for system design
Cyber security for system designCyber security for system design
Cyber security for system design
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Goans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech LibraryGoans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech Library
 
Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agenda
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineer
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
 
9780840024220 ppt ch09
9780840024220 ppt ch099780840024220 ppt ch09
9780840024220 ppt ch09
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Penetration testing experience at the University of Worcester
Penetration testing experience at the University of WorcesterPenetration testing experience at the University of Worcester
Penetration testing experience at the University of Worcester
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community Bank
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and compliance
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
2020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 92020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 9
 
NetGains Infrastructure Security
NetGains Infrastructure SecurityNetGains Infrastructure Security
NetGains Infrastructure Security
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 

Mehr von Teri Radichel

So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 
Cloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptxCloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptxTeri Radichel
 
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022Teri Radichel
 
Real World Cloud Compromise
Real World Cloud CompromiseReal World Cloud Compromise
Real World Cloud CompromiseTeri Radichel
 
Serverless Attack Vectors
Serverless Attack VectorsServerless Attack Vectors
Serverless Attack VectorsTeri Radichel
 
Top Priorities for Cloud Application Security
Top Priorities for Cloud Application SecurityTop Priorities for Cloud Application Security
Top Priorities for Cloud Application SecurityTeri Radichel
 
How the Cloud Changes Cyber Security
How the Cloud Changes Cyber SecurityHow the Cloud Changes Cyber Security
How the Cloud Changes Cyber SecurityTeri Radichel
 
Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019Teri Radichel
 
Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Teri Radichel
 
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Teri Radichel
 
Top 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTop 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTeri Radichel
 
Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Teri Radichel
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the CloudTeri Radichel
 
Locking Down Your Cloud
Locking Down Your CloudLocking Down Your Cloud
Locking Down Your CloudTeri Radichel
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.Teri Radichel
 
Packet Capture on AWS
Packet Capture on AWSPacket Capture on AWS
Packet Capture on AWSTeri Radichel
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWSTeri Radichel
 
Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSTeri Radichel
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security StrategyTeri Radichel
 

Mehr von Teri Radichel (20)

So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
Cloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptxCloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptx
 
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
 
Real World Cloud Compromise
Real World Cloud CompromiseReal World Cloud Compromise
Real World Cloud Compromise
 
Serverless Attack Vectors
Serverless Attack VectorsServerless Attack Vectors
Serverless Attack Vectors
 
Top Priorities for Cloud Application Security
Top Priorities for Cloud Application SecurityTop Priorities for Cloud Application Security
Top Priorities for Cloud Application Security
 
Azure for Auditors
Azure for AuditorsAzure for Auditors
Azure for Auditors
 
How the Cloud Changes Cyber Security
How the Cloud Changes Cyber SecurityHow the Cloud Changes Cyber Security
How the Cloud Changes Cyber Security
 
Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019
 
Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?
 
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018
 
Top 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTop 5 Priorities for Cloud Security
Top 5 Priorities for Cloud Security
 
Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the Cloud
 
Locking Down Your Cloud
Locking Down Your CloudLocking Down Your Cloud
Locking Down Your Cloud
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Packet Capture on AWS
Packet Capture on AWSPacket Capture on AWS
Packet Capture on AWS
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWS
 
Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWS
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security Strategy
 

Kürzlich hochgeladen

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Kürzlich hochgeladen (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Critical Controls Might Have Prevented the Target Breach

  • 1. 1SANS Technology Institute - Candidate for Master of Science Degree 1 Critical Controls Might Have Prevented the Target Breach Teri Radichel May 2016 GSEC, GCIH, GCIA
  • 2. SANS Technology Institute - Candidate for Master of Science Degree 2 The Target Breach • Over 40 million credit cards stolen • Over $200 million in losses • Over 140 lawsuits • What happened? • How could it have been prevented? • The 20 Critical Controls
  • 3. SANS Technology Institute - Candidate for Master of Science Degree 3 Reconnaissance ● Google Search ● Microsoft case study and vendor list ● Controls: – Security Skills Assessment / Training – Need to Know ● Result: No useful information for attack
  • 4. SANS Technology Institute - Candidate for Master of Science Degree 4 Phishing & Malware • Email sent to Fazio Mechanical • Malware installed • Password stolen • Controls: – Malware Defenses – Security Skills Assessment / Training • Result: Malware fails to get credentials
  • 5. SANS Technology Institute - Candidate for Master of Science Degree 5 Vendor Portal Compromise • Stolen credentials access vendor portal • Controls: – Boundary Defense: Limit Network – Account Monitoring / Control • Result: MFA and network controls prevent access
  • 6. SANS Technology Institute - Candidate for Master of Science Degree 6 Lateral Movement • Installation of network tools • Scanning and network traversal • Controls: – Controlled Admin Privilege – Secure Network Engineering – Maintain, Monitor, Analyze Logs • Result: Anomalous behavior prevented
  • 7. SANS Technology Institute - Candidate for Master of Science Degree 7 Misconfigured Systems • Misconfigured systems allow access • Some passwords left as default • Controls: – Secure Configurations – Account Monitoring & Control • Result: System cannot be leveraged by attackers
  • 8. SANS Technology Institute - Candidate for Master of Science Degree 8 POS System Malware • SCCM installs malware on POS systems • Malware undetectable by virus scanner • Controls: – Inventory of Software – Malware Defenses • Result: Malware install prevented
  • 9. SANS Technology Institute - Candidate for Master of Science Degree 9 Incomplete Encryption • Unencrypted data in memory • Controls: – Application Software Security – Data Protection • Result: Malware only sees data that was encrypted at swipe (TRSM)
  • 10. SANS Technology Institute - Candidate for Master of Science Degree 10 Data Movement In Network • Ports 139, 443 and 80 open • Data moved via NetBIOS shares • Controls – Secure Configuration – Secure Network Engineering – Maintain, Monitor, Analyze Logs • Result: Data movement prevented
  • 11. SANS Technology Institute - Candidate for Master of Science Degree 11 Network Tunnels • ICMP tunnel, crafted PING packets • Other customized components • Controls: – Secure Network Engineering – Maintain, Monitor, Analyze Logs • Result: Traffic discovered and blocked
  • 12. SANS Technology Institute - Candidate for Master of Science Degree 12 Data Exfiltration • Data moved to compromised servers around the world • FTP used to retrieve data • Controls: – Data Protection – Maintain, Monitor, Analyze Logs • Result: Prevention of data exfiltration
  • 13. SANS Technology Institute - Candidate for Master of Science Degree 13 Incident Response Failure • Staff did not respond correctly to alerts • Controls: – Security Skills Assessment/Training – Maintain, Monitor, Analyze Logs – Incident Response Management – Pen tests and Red Team exercises • Result: Response limits damage
  • 14. SANS Technology Institute - Candidate for Master of Science Degree 14 Credit Cards Sold • Stolen cards sold on the black market • Control: – Data protection • Result: EMV prevents some use of stolen card data • Note: EMV has limitations; better to prevent loss at source
  • 15. SANS Technology Institute - Candidate for Master of Science Degree 15 Summary • Focus on security, not compliance • Determine risk: likelihood + severity • Understand anatomy of common attacks • Protect critical assets • Leverage the Critical Controls

Hinweis der Redaktion

  1. <number>
  2. <number> In December 2013, 40 million Target credit cards had been stolen by accessing data on point of sale (POS) systems. Target later revised that number to include private data for 70 million customers. Over 11 GB of data was stolen. Target missed internal alerts and was notified of the breach by the Department of Justice. The breach affected Target, customers, employees and banks. Employees lost their jobs including the CEO and CIO. Members of Target’s board of directors were threatened with removal. Banks had to refund fraudulent credit card transactions and pay $200 million for replacement cards. Over 140 lawsuits were filed against Target. Banks sued Target’s PCI compliance auditor, Trustwave. Target faced investigations involving the Department of Justice, the FTC and SEC and possible state fines. Profits dropped 46% in the fourth quarter of 2013 during the holiday season. Customer visits dropped in the new year. How could this attack have been prevented? One possible solution would be to apply industry standard controls to prevent various steps in the attack. In 2008, the federal government arranged a consortium of public and private organizations to come up with a list of Critical Controls based on various other cyber security lists and guidelines. Critical Controls are added to the list because they help prevent and detect known attacks effectively. The Consortium for Cybersecurity Action (CCA) regularly updates the Critical Controls. The Sans Institute web site provides more details about each control at http://www.sans.org/critical-security-controls. By reviewing the Target breach, the Critical Controls can be evaluated to determine if they would have helped prevent this attack. Each step the attackers took to gain access is a point in the system where the attack could have potentially been thwarted. Analysis of each action can determine if there is a Critical Control that would prevent a similar attack in the future. The steps taken by the attackers and Critical Controls are based on the information available at the time this paper was written: https://www.sans.org/reading-room/whitepapers/casestudies/case-study-critical-controls-prevented-target-breach-35412
  3. <number> A Google search would have supplied a great deal of information about how Target interacts with vendors. Results would have revealed a vendor portal and a list of HVAC and refrigeration companies. This reconnaissance would have also revealed a detailed case study on the Microsoft web site that describes how Target uses Microsoft virtualization software, centralized name resolution and Microsoft System Center Configuration Manager (SCCM) to deploy security patches and system updates. The case study describes the Target technical infrastructure, including POS system information, in significant detail. Critical Controls: Security Skills Assessment and Training: Use security awareness training to make employees aware of the danger of sharing too much information. Controlled Access Based on the Need to Know: Remove vendor information and Microsoft case study with detailed information about Target technical systems, processes and staff. Restrict access to vendor and technical information. Replay: No revealing data such as the list of vendors found on Target web site. No access to vendor portal web URL unless coming from an approved network. No case study would be published that had details about the infrastructure of the Target stores, systems, software or maintenance processes. Separation of duties would have prevented insiders from having end-to-end system knowledge or access. Result: Attackers would not have found information about what to attack.
  4. <number> An email containing malware was sent to a refrigeration vendor, Fazio Mechanical, two months prior to the credit card breach. Malware installed on vendor machine may have been Citadel – a password-stealing bot program that is a derivative of the ZeuS banking trojan. The malware stole credentials to an online vendor portal. Controls: Malware Defenses: Require vendors to use commercial virus checking software and other security precautions on the systems used to interact with vendor portals. Security Skills Assessment and Training: Require vendors to go through basic security training or agree to train staff. Replay: Vendor staff is familiar with phishing attacks because Target required vendor training. Commercial virus scanning software prevents installation of malware on the vendor machines. Result: Malware in phishing attack would have failed to install. Attackers would not have obtained access to vendor portal credentials.
  5. <number> Criminals accessed Target’s vendor portal via Fazio Mechanical’s stolen credentials. Controls: Boundary Defense: Limit network access to vendor portal so anyone who obtained the credentials would not be able to access the vendor portal unless on an unauthorized network. Account Monitoring and Control: Require multi-factor authentication to log into vendor portal. Monitor use of vendor portal logins. Profile accounts for normal activity and usage periods to spot anomalies. Replay: A VPN or restricted network is required to access the vendor portal. Multi-factor authentication prevents logging into the portal without an MFA token. Result: Attacker cannot see the portal from an untrusted network. Attacker with stolen password alone could not access vendor portal since the MFA token would also be required. Vulnerabilities within vendor portal and other systems accessible after login would be unavailable to attacker. Without access to portal attacker could not pivot and access other systems on the network.
  6. <number> From this pivot point the attackers could have further infiltrated the network. The specific details are not available but we can speculate that the criminals used the attack cycle described in Mandiant’s APT1 report to find vulnerabilities in the vendor portal and move laterally through the network via back doors, reconnaissance and other vulnerable systems. Common network tools were used to do reconnaissance once inside the network. Controls: Controlled Use of Admin Privileges: Access to admin accounts may have allowed attackers to install tools and bypass network segregation boundaries. Secure Network Engineering: Segregate critical systems from the rest of the network. Maintenance, Monitoring, and Analysis of Logs: Monitor for anomalies including malformed or unexpected packets. Replay: Administrative privilege control prevents install of network tools. More well trained staff monitor logs and recognize anomalies, proactively preventing the breach. Better tools and automation discover and prevent anomalous traffic. Result: Limited network and accounts prevent network traversal. Suspicious activity leads to discovery of infiltration and problem is resolved before attackers reach POS systems.
  7. <number> A Mandiant report describes how reconnaissance in a retail attack uncovered misconfigured systems. A vulnerable system such as a domain controller could be used to obtain access to POS systems. The Microsoft Target Case Study states “Except for centralized authentication, domain name resolution, and endpoint monitoring services, each retail store functions as an autonomous unit” so the attacker would know to look for these pivot points. Another report indicated data was retrieved using the default user name and password for BMC’s Performance Assurance for Microsoft Servers. Controls: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers: Alerts could have been generated by a HIDS when key server configurations were changed. Account Monitoring and Control: Require multi-factor authentication for critical accounts. Monitor accounts. Profile accounts for normal activity and usage periods to spot anomalies. Account privileges should be limited to need to know. Segregate account access across network tiers. Change default passwords. Disable and delete unneeded accounts. Replay: Servers are hardened. Extraneous software is removed. Configuration files do not contain sensitive data and/or any configuration data is encrypted. Encryption keys and processing occurs in an HSM. Configurations are monitored for changes and changes are reviewed for flaws so any misconfigurations would be fixed immediately. Critical systems and accounts require multi-factor authentication. Accounts are given minimal access for specific purposes. All default passwords are changed and passwords are properly managed. Result: Attacker may obtain access to one machine or account but will be limited in what they can access or do after reaching that machine. Attack would have been limited in scope and not been able to interact with POS machines.
  8. <number> Once access was obtained to the necessary systems, malware was installed on point of sale systems. The number of POS machines that were compromised in a short amount of time indicates that the software was likely distributed via an automated update process. A Dell SecureWorks report explains how the malware was installed using SCCM. The malware was custom software, undetectable by virus scanners. Controls: Inventory of Authorized and Unauthorized Software: Whitelisted software on POS systems. Scanning for configuration changes with a HIDS. Malware Defenses: Monitoring via a HIDS may have helped uncover the fact that malware was installed. Replay: Software is inventoried and white listed, preventing new software from installing or running. Applications run under non-admin account. Strong passwords are changed regularly. A Host Intrusion Detection System alerts on system changes. Access to centralized build systems are limited and audited. Additional controls are placed on gold images for POS systems. A central management system ensures software images are signed, managed, secured and audited. Result: Installation of malware on POS machines is not be possible. Any changes to POS configurations would generate alerts to quickly respond to and resolve the problem.
  9. As for the encryption itself, additional layers of protection could have been added to protect card data in POS operating system memory. A tamper resistant security module (TRSM) encrypts data in hardware, not software. Some POS models use a TRSM to encrypt the data at point of swipe. The card data goes directly to the TRSM where it is encrypted. Even if malware got on the POS operating system, it would have been reading encrypted data. Controls: Application Software Security: Developers trained in security should develop systems processing sensitive data. Target software on POS machines was a custom product. Data Protection: P2PE (Point to Point Encryption) for POS systems from PCI compliant vendors may have helped protect card data in memory. Hardware encryption devices directly connected to the pin pad would have kept credit card data out of memory. POI pin pads with tamper resistant security module (TRSM) provide hardware encryption. Replay: Credit card data is encrypted end-to-end and never accessible in memory to malware. POS system uses approved P2PE vendors from PCI web site. Testing verifies data is not stored in memory or inappropriately. POI pin pads with tamper resistant security module (TRSM) use hardware encryption to encrypt credit card data so it never enters the memory on the machine and key is protected. A pin pad is used that encrypts the magnetic stripe data using the TRSM, not just the pin. Result: Credit card data would not have been available to the memory scraping malware. <number>
  10. <number> The software gathered credit card information from memory as cards were swiped. The data was saved to a .dll file and stored in a temporary NetBIOS share over ports 139, 443 or 80. Controls: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers: NetBIOS could be used because port 139 was open and the service was available. Lockdown ports and remove extraneous services. Secure Network Engineering: Prevent data movement across network by limiting open ports that allow traffic to and from critical systems. Maintenance, Monitoring, and Analysis of Logs: Monitoring tools pinpoint data exfiltration and trigger appropriate response. Replay: NetBIOS and file and printer sharing are unaccessible. No extraneous ports or services are available. Inventory of network devices and shares is maintained and monitored, especially on critical systems with sensitive data. Blocked NetBIOS traffic would have generated rejects in logs that could be used to pinpoint and block malicious activity. Result: Data could not be exfiltrated via NetBIOS shares or open ports.
  11. <number> Components used by attackers communicated via an ICMP tunnel. The ICMP traffic consisted of PING packets with custom text messages to initiate data movement from POS machines to compromised machine on the corporate LAN. Other customized components were used to send raw commands over the network that would not be discoverable by common network forensics tools in order to bypass network controls. Controls: Secure Network Engineering: Implement network segregation that limits access to critical systems to specific addresses and ports. URL filtering for egress limits outbound access. Maintenance, Monitoring, and Analysis of Audit Logs: Hiring more staff or better training staff to adequately monitor logs may have helped mitigate losses. Tune logging systems to limit false positives, making it easier to pinpoint real threats. Use tools that detect and prevent anomalous traffic. Replay: Additional logging and alerting exists for traffic coming in or out of POS systems. NetBIOS and open ports are not available to exfiltrate data. Use of ICMP and other protocols is limited to what is explicitly required. Better monitoring tools spot unusual ICMP traffic and trigger appropriate response. Result: Unusual packets and traffic patterns are discovered and blocked.
  12. <number> Data was moved to drop locations on compromised servers all over the world via FTP. The attackers retrieved the data from drop locations. Controls: Data Protection: Employ tools at perimeters to monitor for sensitive data leaving the company. Use Data Loss Prevention systems. Monitor traffic. Block known compromised hosts. Maintain, Monitor, Analyze Logs: Anomalous traffic patterns can indicating possible data exfiltration generate alerts and appropriate response. Replay: Implement strict access for data moving out of the company via FTP or known file transfer protocols. Create a proxy specifically for data movement such as FTP, SFTP and other protocols used to send data to remote locations. Carefully monitor traffic for unexpected activity. Monitor outbound traffic for unexpected changes and anomalies. Result: Data moving out of the organization would have been spotted. Breach would have been stopped sooner.
  13. <number> While the attack was in progress, monitoring software (FireEye) alerted staff in Bangalore, India. They in turn notified Target staff in Minneapolis but no action was taken to stop the data exfiltration. Controls: Security Skills Assessment and Training: Make sure security staff is adequate to monitor logs appropriately and well trained. Maintenance, Monitoring, and Analysis of Audit Logs: Hiring more staff or better training staff to adequately monitor logs may have helped mitigate losses. Incident Response and Management: Better policies and procedures for incident management may have prevented this breach or minimized the losses. Penetration Tests and Red Team Exercises: Pen testing exercises to mimic attacks and generate alerts could indicate whether or not staff responds to alerts appropriately and aid in training. Replay: Adequate staff are available to look at alerts in detail and respond accordingly. Processes are appropriate and staff is well trained to handle alerts in such a way that the breach would have been uncovered and quickly stopped. Better network monitoring systems help uncover the breach sooner. Penetration tests and Red Team testing ensure security teams are prepared to respond. Result: The alerts would have been analyzed differently and the data breach and the response would have mitigated losses by stopping the breach sooner.
  14. <number> Credit cards were sold on the black market after stolen from Target. Stolen card data was used to create fake cards and facilitate fraudulent transactions Controls: Data Protection: EMV (Europay, MasterCard and VISA), otherwise known as chip and pin, will help prevent some use of stolen cards because it requires a pin at the time the card is used. This technology protects the customer after the data has been stolen because it prevents using a cloned card in some cases. It would not have completely prevented loss because some devices support or failover to the magnetic stripe method when chip and pin is not available. Replay: Use of the cards would have been prevented when sold on the black market if the fake card was originally a chip and pin card, and then used on a card reader that supported chip and pin technology. Result: Some fraudulent transactions using stolen cards could have been prevented. Note: Protection is thwarted on manual entry and on failover to MSR when the card reader doesn’t support the chip and pin technology and the card still has a magnetic stripe. When EMV is not present, transaction will failover to magnetic stripe, so protection of data at source is better than after the fact. EMV does not prevent stealing data from a POS system.
  15. <number> Target passed PCI compliance audits prior to this breach, indicating they had implemented security required by the credit card processing industry. Fazio Mechanical issued a statement claiming they were compliant with industry standard information security regulations. PCI compliance alone is not a risk management strategy. Only assets related to payment card processes are considered. Many businesses approach PCI compliance by trying to minimize what is in scope for the PCI audit. Assets and implementation details that may pose the greatest risks to the organization may fall outside of this scope and therefore not be adequately addressed if PCI alone drives a business security decisions. For example, at the time of the breach, the current PCI standard says consideration should be made for data stored in memory but no specific requirements are defined. Rather than relying on a mandated checklist, organizations will be better able to mitigate losses by performing organization-wide risk management activities on a regular basis. Vulnerabilities are system weaknesses that can be exploited. Threats are events that have negative consequences. Threats and vulnerabilities for all systems, not just those within scope for compliance audits, are identified. Threats and vulnerabilities are then prioritized and fixed to limit risk to an acceptable level. Constant re-evaluation is required as the threat landscape is always changing. After threats and vulnerabilities are identified for all systems, the risk posed by each is carefully analyzed. Generally, the vulnerabilities with the highest likelihood of occurring and most severe consequence in terms of cost to the organization should be prioritized highest and fixed first. This has nothing to do with compliance and everything to do with what poses the greatest risk to the organization. Then application of the Critical Controls where risk is greatest may help thwart attacks such as those used in the Target breach.