This presentation is an attempt to present the complex Subject of Cybersecurity in a concise format with main focus to present the core of Cybersecurity and best practises and standards to protect an enterprise Network.Comments of readers welcomed.Thank You (Wajahat Iqbal)
Email: Wajahat_Iqbal@yahoo.com
3. Definition
Cybersecurity Domain is a collection of best
practices,Technologies,Frameworks & Standards to
protect an enterprise,organization ,Govt
entities,Military establishment,Individual user from
global cyber threats(Theft Identity,Cybertheft,Cyber-
ransom,Infrastructure damage) resulting in either
Financial,Economical,Copyright Information,Personal
identity,Infrastructure loss.
3
4. Major Cybersecurity standards
ï NIST Cybersecurity Framework (De-facto standard)
ï ISO 27001 (Information Security Management
Framework)
ï ISACA COBIT5
ï NIST SP800-53
ï NIST SP800-30
ï ISA 62443
ï ISO 27005
The Cybersecurity standards were first adopted in the Seoul (South Korea) Conference on
Global Cybersecurity in 2013
4
5. Cybersecurity holistic view
ï Manage physical access to IT Infrastructure
ï Manage sensitive documents and output Devices
ï Monitor the Infrastructure for security related Events
ï Protect against Malware (*** Most challenging )
ï Manage Network and Connectivity security
ï Manage User Identity and logical access
ï Protect critical and vital Infrastructure (Banks,Vital
Industrial installations,IT,Nuclear power,Dams,Defense)
5
6. Cybersecurity Lifecycle
The Cybersecurity Lifecycle can be described aptly by the
below (Figure-1) which decomposes the various stages .
6
(1) Identify
Business
outcomes
(2)Understand
Vulnerabilities
Threats
(3)Create
current profile
(4)Conduct Risk
assessments
(5)Apply
Controls
(6)Create
Target profile
(7)Determine/
prioritize gaps
(8)Implement
plan
(9)Report to
stakeholders
(10)Continuous
monitoring
Cyber security Lifecycle
7. Risk actions
7
Risk Actions: The most generally accepted Actions on
Risk Management Cycle are:
(1) Risk Acceptance
(2) Risk Transfer
(3) Risk Avoidance
(4) Risk Mitigation â Most practised action
ïDepending on Risk Appetite/Risk Tolerance threshold
of an Organisation
These are drawn from the ISO 27001 Standard for ISMS
which is the most widely used and accepted standard
on IT Security involving Risk Management processes
9. Threat to Cyberdefense
9
The damage caused by threats to Cyberdefense can be
characterized by loss of âConfidentiality, Integrity or
availability (CIA)â, the basic model of Data Security as
practiced in ISO27001/27002 and other globally accepted
standards
10. Hackers profile
The different type of Hackers are:
ï Individual Hacker
ï State Sponsored (With Political & Military Agenda)
ï Cyber Criminals (Organised Mafia)
10
11. Hacker Kill Chain
The USA Aeronautics Major Lockheed Martin â Kill Chain
methodology describes seven steps from reconnaissance
through actions on the objectives and recommends defenses
be designed to align with each of the seven steps in the process
below:
11
12. Summary of Kill Chain
ï Reconnaissance:
ï Finding the Host,Internet Website,Domain
ï Do IP Address Scan of the Business Domain
ï Do Port Scan of the Active hosts
ï Automated scanning by Botnets (Compromised
Systems)
ï Locate Network Topology and identify potential
access control Devices
12
13. Summary of Kill Chain(Contâd)
ï Weaponization:
ï Identify the Vulnerability
ï Initiate the Attack
ï Coupling a remote access Trojan(RAT) with an
Exploit into a deliverable payload,typically by means
of an automated tool (The commonly used
weaponizer are Adobe PDF and Microsoft Office
documents)
ï Delivery:
ï Transmission of Weapon to the targeted environment
ï Three most prevalent delivery vectors for weaponzied
payloads are â Emails,Compromised Web Sites & USB
removal media
13
14. Summary of Kill Chain (Contâd)
ï Exploitation:
ï Email,Website &USB explore a Vulnerability on
launch and Hacket gets remote access to admin Shell
ï Exploitation targets Operating System or Application
vulnerability
ï Installation:
ï Install Malware(Malicious Code) into Memory,Disk
or Operating System Kernel,modify windows
registry,modify Unix Kernel
ï Allow installation of remote access Trojan or
backdoor on the victim system
14
15. Summary of Kill Chain (Contâd)
ï Command & Control (C2):
ï Compromised system/hosts beacon back to the Master
Controller to establish C2 Channel
ï Hacker gains complete control of the compromised system
ï Intruders have âhands on the keyboardâ access to the
targeted environment
ï Action:
ï This Activity is data exfiltration that involves
collecting,encrypting and extraction information (e,g
Deface Website,Steal Credit Card Information,Steal
Copyright Information,Steal IE passwords,Modify Banking
websites,Steal medical records) etc
15
16. BOTNET Attack(Automated)
These days professional Hackers,Malware developers,Cyber
Criminals work in tandem to develop automated Tools to
initiate a Cyber Attack against the intended victim/host.The
mechanism is to install remote access Trojan(RAT) on
compromised system(BOTNETS) which could number in
thousands and then initiate the attack in phases as shown in
Figure- 2 (next page)
Key Components of a BOTNET Attack:
ï BOTNET Construction Kit
ï Command & Control Capability
ï Remote Access Trojan(RAT)
ï Custom developed Malware(Malicious Code) for the
intended Victim/Host
(Example BOTNET Attacks - ZEUS,CITADEL,GO ZEUS) 16
23. SOC Components
Lately SOC has become an integral part of any
Organisation to protect itself from Cyber attacks and
detect/correct/recover from a Cyber Incident in the
quickest span of time without further damage to its
reputation. The critical components of a SOC are:
ï IDS/IPS Infrastructure
ï Firewall Infrastructure
ï SIEM (Security Information and Event Monitoring
System)
ï Logging and Alerting mechanism
ï Security Incident Processes
ï Forensics capability
ï User Training & Retention
ï Managing Evidence 23
25. Cybersecurity Architecture
25
âą Network Security
âą Identity,Authentication and Access Management
âą Data Protection and Cryptography
âą Monitoring Vulnerability & Patch Management
âą High Availablity,Disaster Recovery & Physical
protection
âą Asset Management & Supply Chain
âą Policy,Audit,E-Discover & Training
âą Systems Adminstration
âą Application Security
âą Endpoint,Server & Device Security
Cybersecurity
Architecture
The Cyber Architecture consists of the following components:
26. Defense in Depth(DOD)
This is the most common practice employed by
Organisation to create and implement a multilayered
approach to Cybersecurity.It is described by the following
process (Figure-3) and can be implemented at various
layers of the Network Infrastructure
26
.
27. 9 Basic steps of Cybersecurity
These are the guidelines to follow while drawing up a
comprehensive Cybersecurity program in an Organisation
ï #1 : Explore the Legislation and other requirements
ï #2: Define the Business benefits and get top Management
support (Very Important)
ï #3: Setting the Cybersecurity requirements
ï #4: Choosing the framework for Cybersecurity Implementation
ï #5:Organizing the Implementation(Setting up Teams,PM
Resources,Project Charter,Budget etc)
ï #6: Risk Assessment & Mitigation (Applying Controls)
ï #7: Implementation of Controls
ï #8: Training & Awareness
ï #9: Continuous Monitoring and Checks
and Reporting to Senior Management (C Level Executives)
27
28. Cybersecurity operational processes
To maintain an effective Cybersecurity posture,the CISO
should maintain a number of enterprise operational
processes to include the following:
ï Policies and Policies Exception Management
ï Project and Change Security Reviews
ï Risk Management
ï Control Management
ï Auditing and Deficiency Tracking
ï Asset Inventory and audit
ï Change Control
ï Configuration Management Database Re-Certification
ï Supplier reviews and Risk assessments
28
35. Network perimeter best security practises
ï Restrict use of administrative utilities(e,g Microsoft Management
Console)
ï Use secure File permission system i.e NTFS & UFS File System
ï Manage Users properly especially the Admin Accounts on Unix &
Windows machines
ï Perform Effective Group Management for â Admin,Print,Power,Server
operator & Normal Users in Windows 2000 O.S
ï Enforce strong password policy,password aging for Users
ï Enable Windows O.S and Unix O.S logging facility
ï Eliminate unnecessary Accounts (especially the Employeeâs who
have left the Organisation)
ï Disable Resource sharing service and remove hidden administrative
shares â C$,ADMIN$,WIN NT$ in older version of Windows O.S
ï Disable unneeded Service in Unix â Telnet,Finger ,tftp,NTP(Network
Time protocol)
ï Applications should use the latest Security patches in Production
Environment
35
36. Network perimeter best security practises
ï Enforce using NAT(Network Address Translation) & PAT(Port Address
Translation) in internal Network (Firewalls & Routers)
ï Enable DNS Spoofing,DOS Attacks (Smurf & Direct Broadcast
Attacks) mitigation policies on Gateway Routers via ACL and Cisco IOS
ï Enforce Best Industry practice of secure Application Coding to
mitigate âBuffer Overflowâ Vulnerability in the Memory
ï Enforce strong password policy,password aging,lockout policy for
Application Databases (Oracle,Sybase)
ï Install latest O.S and Application patches as soon they are available
from Vendors
ï Install latest Security patches for Browsers,Flash Players,Microsoft
Applications
ï Update the Anti-Virus & IDS/IPS /HIDS Signatures on frequent basis
ï Update the Business Continuity/DR Plan and keep latest backup of all
critical Servers
36
37. Network perimeter best security practises
ï Update and Install latest Security patches for Application
Gateways(Proxies),Web Filltering Devices,Firewalls
ï Check the Logs daily on Firewalls,IPS/IDS,HIDS for any Security
Incident triggered by any malicious Activity
ï Implement Industry Best practices to secure the Network (NIST
Guidelines,SANS 20 Critical Security Controls,NSA Guidelines etc)
ï Place the Mission Critical Web Servers (User Interface) on a Screened
Subnet,DMZ and the backend Application Server & Oracle Database
Server in the internal Network
ï Change the Default Password of SNMP Community string on Network
Devices
37
40. CASE STUDY â Cyber attack secure design
Design Features:
ï Border Router:A Gateway Router connects the network to the
Internet and provides basic Filtering through ACL(Access
Control Lists) on Ingress & Egress Interfaces
ï Just behind the Gateway Router is Stateful Inspection Firewall
that enforces the majority of access control of the network
ï Public services and private services have been separated by
putting them on different network segments (DMZ,Corporate &
Screened Subnet)
ï Split DNS is being used on public DNS Server and it provides
Name resolution for public services only
ï Intrusion Detection Systems(IDS) are located on the
public,private,network perimeter end points to watch for
unusual activity
ï The Front end Application Web server is on the Screened Subnet
and the backed Oracle DB Server is behind the Internal Firewall
40
41. CASE STUDY â Cyber attack secure design
ï Host based IDS(HIDS) complement the Network by adding
additional layer of security and are placed on the individual
mission critical servers(Anti-Virus,Email Proxy,Web
Proxy,Internal Email Server,Oracle DB Server) to monitor the
systems network activity,log files,Files Systems Integrity and
User actions.A host based IDS will also detect and generate an
alarm when it detects escalation of privileges for a Guest user to
Admin Account
ï Host based IDS can help detect attacks that network IDS evasion
techniques
ï Host based IDS is also useful for correlating attacks picked up by
Network sensors
ï All security log entries are sent to the SIEM(Security Information
and Event Monitoring System) for Data Analysis and
Forensics.The SIEM generates an Alert when suspicious activity
is detected
ï For the Remote Office users all their Laptops are installed with
Personal Firewalls to mitigate/detect Hacker entry through
backdoor channels
41
42. CASE STUDY â Cyber attack secure design
ï All configuration of security devices is performed from the
management console
ï Additionally one can install TACACS,RADIUS Servers to monitor
Users access on the Gateway Router and other mission critical
Servers
The sample Rule base configured for the above Network
Design on the Stateful Inspection Firewall can be as follows
(Illustrative purpose only): Next page
42
44. CONCLUSION
Conclusion Note:
The process to securing and making a perfect âDigital
Worldâ is a ongoing continuous Journey ,and with ever
changing Modus operandi of the Hackers and the Cyber
Criminals globally,we always have to be one step forward in
the race to protect our Digital Assets,Intellectual
property,Identity,Infrastructure.
Thank You
(Wajahat Iqbal)
44