SlideShare ist ein Scribd-Unternehmen logo
1 von 24
The Assumed Breach Model
A Practical Approach
• Manager – Security Architecture
• Heavily focused on Cloud/AWS
• Experience includes moving from End User
Support, to Sys Admin, to Consulting, to
Information Security to Security Architecture
Agenda
• Current Landscape
• Strategy
• Next Steps
Current Security
Landscape
• Checking Boxes
• We play whack-a-mole with security
controls and tools
Shiny New
Toys…Tools
• This is a firewall without a
strategy
Primarily Reactive
• We just collect logs to collect
logs
What is assumed
breach?
• Simply put: A security strategy
that assumes any given
endpoint is breached to some
extent and controls risk as
such.
Strategy
• Access Control
• Choke Points
• Trust Zones
• Detection Capabilities
Principles
• Empower Business
• Keep It Simple
Access Control
• What is being protected?
• How do we protect it if we
assume it is already breached?
Access Control:
What is being
protected?
Internal
Restricted
Public
• Payroll
• Policies and
Procedures
• PII, PCI, PHI
• SOX, GLBA
• Marketing
• Public Website
Access Control:
Tiered Access • Lateral Movement
• Administrative Access
• WannaCry
https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material
Choke Points
• Trusted sources
• Areas of known activity
• Minimize surface areas for non-
standard things (i.e. front gate
and not the walls)
• Not a new concept
Choke Points
Trust Zones
• More than network
segmentation
– We can have segmentation and
still have a flat network
• Must empower businesses
– Too many hoops to jump through,
at best users will be mad, worst
case, they will find a way around
Trust Zones
VDI
Medical
Devices/ATMs/ICS
Servers
User Networks
EMR/Mainframe/
ICS
Detection Strategy
• Identify the needles before
building the haystack
• Minimize attack surfaces
• Focus on ‘all hands on deck’
alerts
• Review alerts vs reports
Detection Strategy
• Don’t try to think like an
attacker
• Stop trying to prevent the
latest and greatest 0 day – just
assume it is already there
Next Steps • Access Control
– Minimize perimeter
– Control changes
– Tiered accounts for administration
Next Steps • Choke Points
– Bring the battle to you
– Know what normal looks like
– Tiered Accounts
– Reduce the noise
Next Steps • Trust Zones
– Segment your network
– Know what is supposed to talk to each
other
– This should be transparent to users
– Keep it simple, but not flat
Next Steps • Detection Capabilities
– Use guides (see references)
– Know what normal is, be able to detect
what isn’t
– Reduce the noise
References
• Don’t Think like an attacker
– Mitre ATT&CK – https://attack.mitre.org/wiki/Main_Page
– Known IOCs - https://github.com/Neo23x0/sigma
– Threat Hunter Playbook https://github.com/Cyb3rWard0g/ThreatHunter-Playbook
• Strategy:
– http://threatexpress.com/2018/01/threat-mitigation-strategies-observations-recommendations/ -
James Tubberville
– http://www.andrewalaniz.com/2017/12/10-immutable-laws-assumed-breach/ - Andrew Alaniz –
10 Immutable Laws of Assumed Breach
– https://www.slideshare.net/JoeVest1/using-ioc-to-design-and-control-threat-activities-during-a-
red-team-engagement - Joe Vest – Using IOCs to control threats
– https://technet.microsoft.com/en-us/library/hh278941.aspx - Microsoft - 10 Immutable Laws of
Security
• Detection:
– https://blogs.technet.microsoft.com/jepayne/2015/11/26/tracking-lateral-movement-part-one-
special-groups-and-specific-service-accounts/ - Jessica Payne – Tracking Lateral Movement
– http://www.andrewalaniz.com/2017/12/assumed-breach-model-practical-approach-part-1/ -
Andrew Alaniz – Assumed Breach Model
– http://www.andrewalaniz.com/2016/10/windows-event-forwarding-collector-resources/ -
Resources for capturing Windows Events

Weitere ähnliche Inhalte

Ähnlich wie Assumed Breach

Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
System Security Beyond the Libraries
System Security Beyond the LibrariesSystem Security Beyond the Libraries
System Security Beyond the LibrariesEoin Woods
 
Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdfMarlboroAbyad
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Commercial and government cyberwarfare
Commercial and government cyberwarfareCommercial and government cyberwarfare
Commercial and government cyberwarfareNicholas Davis
 
Commercial And Government Cyberwarfare
Commercial And Government CyberwarfareCommercial And Government Cyberwarfare
Commercial And Government CyberwarfareNicholas Davis
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information securityAnant Shrivastava
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a ShoestringNCC Group
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Claus Cramon Houmann
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basicsgocybersec
 

Ähnlich wie Assumed Breach (20)

Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
System Security Beyond the Libraries
System Security Beyond the LibrariesSystem Security Beyond the Libraries
System Security Beyond the Libraries
 
Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdf
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Commercial and government cyberwarfare
Commercial and government cyberwarfareCommercial and government cyberwarfare
Commercial and government cyberwarfare
 
Commercial And Government Cyberwarfare
Commercial And Government CyberwarfareCommercial And Government Cyberwarfare
Commercial And Government Cyberwarfare
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
C days2015
C days2015C days2015
C days2015
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Kürzlich hochgeladen (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Assumed Breach

  • 1.
  • 2. The Assumed Breach Model A Practical Approach
  • 3. • Manager – Security Architecture • Heavily focused on Cloud/AWS • Experience includes moving from End User Support, to Sys Admin, to Consulting, to Information Security to Security Architecture
  • 4. Agenda • Current Landscape • Strategy • Next Steps
  • 5. Current Security Landscape • Checking Boxes • We play whack-a-mole with security controls and tools
  • 6. Shiny New Toys…Tools • This is a firewall without a strategy
  • 7. Primarily Reactive • We just collect logs to collect logs
  • 8. What is assumed breach? • Simply put: A security strategy that assumes any given endpoint is breached to some extent and controls risk as such.
  • 9. Strategy • Access Control • Choke Points • Trust Zones • Detection Capabilities
  • 11. Access Control • What is being protected? • How do we protect it if we assume it is already breached?
  • 12. Access Control: What is being protected? Internal Restricted Public • Payroll • Policies and Procedures • PII, PCI, PHI • SOX, GLBA • Marketing • Public Website
  • 13. Access Control: Tiered Access • Lateral Movement • Administrative Access • WannaCry https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material
  • 14. Choke Points • Trusted sources • Areas of known activity • Minimize surface areas for non- standard things (i.e. front gate and not the walls) • Not a new concept
  • 16. Trust Zones • More than network segmentation – We can have segmentation and still have a flat network • Must empower businesses – Too many hoops to jump through, at best users will be mad, worst case, they will find a way around
  • 18. Detection Strategy • Identify the needles before building the haystack • Minimize attack surfaces • Focus on ‘all hands on deck’ alerts • Review alerts vs reports
  • 19. Detection Strategy • Don’t try to think like an attacker • Stop trying to prevent the latest and greatest 0 day – just assume it is already there
  • 20. Next Steps • Access Control – Minimize perimeter – Control changes – Tiered accounts for administration
  • 21. Next Steps • Choke Points – Bring the battle to you – Know what normal looks like – Tiered Accounts – Reduce the noise
  • 22. Next Steps • Trust Zones – Segment your network – Know what is supposed to talk to each other – This should be transparent to users – Keep it simple, but not flat
  • 23. Next Steps • Detection Capabilities – Use guides (see references) – Know what normal is, be able to detect what isn’t – Reduce the noise
  • 24. References • Don’t Think like an attacker – Mitre ATT&CK – https://attack.mitre.org/wiki/Main_Page – Known IOCs - https://github.com/Neo23x0/sigma – Threat Hunter Playbook https://github.com/Cyb3rWard0g/ThreatHunter-Playbook • Strategy: – http://threatexpress.com/2018/01/threat-mitigation-strategies-observations-recommendations/ - James Tubberville – http://www.andrewalaniz.com/2017/12/10-immutable-laws-assumed-breach/ - Andrew Alaniz – 10 Immutable Laws of Assumed Breach – https://www.slideshare.net/JoeVest1/using-ioc-to-design-and-control-threat-activities-during-a- red-team-engagement - Joe Vest – Using IOCs to control threats – https://technet.microsoft.com/en-us/library/hh278941.aspx - Microsoft - 10 Immutable Laws of Security • Detection: – https://blogs.technet.microsoft.com/jepayne/2015/11/26/tracking-lateral-movement-part-one- special-groups-and-specific-service-accounts/ - Jessica Payne – Tracking Lateral Movement – http://www.andrewalaniz.com/2017/12/assumed-breach-model-practical-approach-part-1/ - Andrew Alaniz – Assumed Breach Model – http://www.andrewalaniz.com/2016/10/windows-event-forwarding-collector-resources/ - Resources for capturing Windows Events