Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk...

29
SESSION ID: #RSAC Monzy Merza Active Response: Automated Risk Reduction or Manual Action? sec ops | dream CRWD-01 Chief Security Evangelist Splunk @monzymerza

Transcript of Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk...

Page 1: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

SESSION ID:

#RSAC

Monzy Merza

Active Response: Automated Risk

Reduction or Manual Action?

sec ops | dream

CRWD-01

Chief Security Evangelist

Splunk

@monzymerza

Page 2: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Agenda

2

Active Response Drivers

Facets of Active Response

Balancing Business Risk and Active Response

Required Capabilities

Page 3: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Sources of Cyber Risk

3

Cyber Criminals

Malicious Insiders

Nation States

Page 4: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Active Response Drivers

4

Constant, Simultaneous Attacks

Triaging and False Positives

Time to Response

Human Resource Constraints

Page 5: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

HUMAN TIME RESPONSE IS UNTENABLE

5

Page 6: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Human-Enabling Active Reponse

6

Risk Based Connecting Data and People

Context &

Intelligence

101111101010010001000001111011111011011111010100100010000011110111110101001

101111101010010001000001111011111011011111010100100010000011110111110101001

Page 7: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Facets of Active Response

7

Transparency and human enablement is core to risk based active

response

Page 8: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Conventional Active Response

8

Block and tackle

Config changes on endpoints, network or gateways

Policy changes on access/auth or business systems

Attach back

Fire packets at the attack source

Interact via CnC or payload

Page 9: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Conventional Active Response

9

Challenges

Complex business and mission

requirements

Distributed and diverse infrastructure

Repercussions

Advantages

Block-and-tackle cause and effect is

well understood

Action is decisive

Attack back is human mediated

Page 10: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Facets of Active Response – Risk Based

10

Context through post-processing

Enrichment of event data – asset, identity, access lookup

Tiered analysis – submit malware to a sanbox

Signaling and messaging

Expert system communication – start packet capture

Summarization – forward summary data to ticketing system

Evidence preservation

Disk forensic snapshot

Move event data out of rotation repository

Page 11: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Risk-Based Active Response

11

Challenges

Technology managed by different

teams

Integration challenges – lack of open

APIs

No central broker or nerve center

Advantages

Low business risk in case of errors

Analyst has deeper context and

knowledge

Not making any configuration

changes

Page 12: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

AND NOW FOR SOMETHING CONTROVERSIAL…

12

Page 13: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

…LOW OR HIGH CONFIDENCE AS IT RELATES TO BUSINESS RISK

13

Page 14: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Confidence Drives Depth of Decision

14

What is the business risk?

How complete is the threat context?

What/who will be impacted by change?

How hard is it to revert the change?

Who has the Get Out of Jail Free Card?

Page 15: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Natural Remedy for Active Response

15

Focus on business risk and mission

Let the machines be machines

Enable the human to be human

Page 16: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

BALANCING BUSINESS RISK AND ACTIVE RESPONSE

16

Page 17: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Who Does What

17

Machine

Correlate

Auto-collect

Message, signal

Execute action

Human

Contextualize

Prioritize

Mediate action

Apply gut feel

Page 18: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Production Active Response Actions

18

High Confidence

Alert on correlations

Block on IP or domain

Modify configs

Report on actions taken

Low Confidence

Alert on correlations

Contextualize alerts

Gather more data for alert artifacts

Kick off secondary analysis

Prepare for human

Page 19: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Examples of Confidence

19

High Confidence

Threat feed matches from ISAC or

internal sources

Trigger from inline dynamic analysis

engine

Correlation alert for beaconing activity

Low Confidence

Threat feed match from a free intel feel

Correlation alert from a statistical engine

Individual signature match from IDS/IPS

Page 20: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

THE MACHINE CAPABILITY

20

Page 21: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Key Technical Capabilities

Security instrumentation

Aggregation, correlation, alert

Integration across the instrumentation

A nerve center – orchestration, messaging

Tracking of all actions and messages

21

Page 22: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

22

Threat Intelligence Network Endpoint Authentication

Security Instrumentation

Page 23: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Security Instrumentation – Core Capabilities Persist, Repeat

Reputation services, known relay/C2 sites, infected sites, IOC, attack/campaign intent and attribution

Who talked to whom, traffic, malware download/delivery, C2, exfiltration, lateral movement

Running process, services, process owner, registry mods, file system changes, patching level, network connections by process/service

Access level, privileged use/escalation, system ownership, user/system/service business criticality

23

• Third-party threat intel • Open source blacklist • Internal threat intelligence

• Firewall, IDS, IPS • DNS • Email

• Web proxy • NetFlow • Network

• AV/IPS/FW • Malware detection • Endpoint forensics

• Config mgmt • OS logs • File system

• Directory services • Asset mgmt • Authentication logs

• Application Services

• VPN, SSO

Threat intelligence

Access/Identity

Endpoint

Network

Page 24: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Building Confidence for Active Response Persist, Repeat

Update threat lists. Enrich threat list info with new knowledge.

Add to custom policy groups: vlans, watch list, bad actors, policy groups. Start/stop packet capture.

Acquire config info, invoke snapshots, submit files to sandbox, update local signatures, clean up infected files, start/stop processes and services.

Acquire business info, groups, travel, organizational priority. Modify membership, revoke tokens or certs.

24

• Third-party threat intel • Open-source blacklist • Internal threat intelligence

• Firewall, IDS, IPS • DNS • Email

• Web proxy • NetFlow • Network

• AV/IPS/FW • Malware detection • Endpoint forensics

• Config mgmt • OS logs • File system

• Directory services • Asset mgmt • Authentication logs

• Application Services

• VPN, SSO

Threat intelligence

Access/Identity

Endpoint

Network

Page 25: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

25

Page 26: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

High Confidence Policy Change

Attack

Corp Machine Layer 7 FW

IDS Event to a Critical Server

Block

Bypass FW

IDS Alerts

Page 27: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Low Confidence Aggregation

Dynamic analysis alert

Did it detonate on the endpoint?

Check for endpoint logs

Check for AV logs

Take a snapshot – proc list, netstat

Start packet capture

Disk forensic snapshot

Page 28: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Active Response Is Survival

Attack volume is high

Human time response is not tenable

Active response enables the human analyst

Active response != cutting people’s Internets

Page 29: Active Response: Automated Risk Reduction or Manual · PDF fileActive Response: Automated Risk Reduction or Manual Action? sec ops ... master slide #RSAC Facets of ... • Web proxy

Presenter’s Company

Logo – replace on

master slide

#RSAC

Thank You

Questions?

More discussions: [email protected]