Differences between defence-in-depth for computer security and … · Differences between...

16
Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent consultant, UK [email protected]

Transcript of Differences between defence-in-depth for computer security and … · Differences between...

Page 1: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

Differences between defence-in-depth for computer security and physical protection

Mike StJohn-Green

Independent consultant, UK

[email protected]

Page 2: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

Medieval castle with its concentric walls

Page 3: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

Digital technology

Also known asProgrammable Digital systems

and Computer-based systems

Images: www. wallpapercave.com

Page 4: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

Images: www. Wallpapercave.com

Is the notional environment … that harnesses the power of networked digital technology

Cyberspace …

Page 5: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

https://giphy.com/gifs/super-mario-maker-W9xUtJVpgSyHu

1. Lack of determinism, instinct and intuition

Differences between Cyberspace and physical space

Page 6: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

https://www.economist.com/blogs/economist-explains/2015/04/economist-explains-17

1. Lack of determinism, instinct and intuition

Differences between Cyberspace and physical space

2. Pace of change

Moore’s Law

100x increase in transistors every ten years

Page 7: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

https://www.nngroup.com/articles/law-of-bandwidth/

1. Lack of determinism, instinct and intuition

Differences between Cyberspace and physical space

2. Pace of change

Neilsen’s Law

50x increase every ten years in Internet connectivity

Page 8: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

1. Lack of determinism, instinct and intuition

Differences between Cyberspace and physical space

2. Pace of change

PLENTY OF SCOPE FOR FAULTS:SOFTWARE COMPLEXITY

Software size doubles every 4 years

3. Unknown vulnerabilities

http://www.engineeringnewworld.com

Page 9: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

1. Lack of determinism, instinct and intuition

Differences between Cyberspace and physical space

2. High pace of change

ALL DIGITAL TECHNOLOGY IS PART OF THE GLOBAL INTERNET

3. Unknown vulnerabilities

www.wallpapercave.com, Wikimedia.org – 68040 microprocessor

4. Indistinct boundaries

Page 10: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

1. Lack of determinism, instinct and intuition

Differences between Cyberspace and physical space

2. High pace of change

3. Unknown vulnerabilities

www.wallpapercave.com,

4. Indistinct boundaries

5. Unreliable detection methods

European companies take an average of 469 days to discover attackers in their system.

Global average is 146 days

– based on analysis by Mandiant in 2016

THE EVIDENCE IS IN PLAIN VIEW:

The average dwell-time of attackers is 229 days – FireEye in 2014

Page 11: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

1. Deterrence

Differences between PPSAnd computer security

2. Detection

ATTRIBUTION IS VERY DIFFICULT

3. Delay

4. Response

WE HEARD – DECTECTION IS UNRELIABLE

THEREFORE CANNOT RELY ON DELAY

RESPONSE IS STILL VITALLY IMPORTANT;FALSE ALARMS MAY BE HIGHER

PACE OF CHANGE MAKES THIS CHALLENGING;MUST DEAL WITH BLENDED ATTACKS

5. Design Basis Threat

Page 12: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

SecurityLevel 5

SecurityLevel 4

SecurityLevel 3 Security

Level 2Security Level 1

Zone SL2

Zone SL1

Zone SL2

Zone SL3

Zone SL4

Zone SL3

Zone SL4

Zone SL5

Zone SL5

SDA SL1 SDA SL1

SDA SL2

SDA SL2

SDA SL2

SDA SL2

SDA SL3

SDA SL3SDA SL3

SDA SL3

SDA SL3

Digital Asset SL4

Digital Asset SL4

Digital Asset SL4

Digital Asset SL4

Digital Asset SL4

Digital Asset SL5

Digital Asset SL5

Digital Asset SL5

Digital Asset SL4

Zone SL3

Zone SL4

Digital Asset SL2

Networks not associated with the facility

Security measure

What does this mean forDefence-in-depth?

Page 13: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

SecurityLevel 5

SecurityLevel 4

SecurityLevel 3 Security

Level 2Security Level 1

Zone SL2

Zone SL1

Zone SL2

Zone SL3

Zone SL4

Zone SL3

Zone SL4

Zone SL5

Zone SL5

SDA SL1 SDA SL1

SDA SL2

SDA SL2

SDA SL2

SDA SL2

SDA SL3

SDA SL3SDA SL3

SDA SL3

SDA SL3

Digital Asset SL4

Digital Asset SL4

Digital Asset SL4

Digital Asset SL4

Digital Asset SL4

Digital Asset SL5

Digital Asset SL5

Digital Asset SL5

Digital Asset SL4

Zone SL3

Zone SL4

Digital Asset SL2

Networks not associated with the facility

Security measure

What does this mean forDefence-in-depth?

Page 14: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

SecurityLevel 5

SecurityLevel 4

SecurityLevel 3 Security

Level 2Security Level 1

Zone SL2

Zone SL1

Zone SL2

Zone SL3

Zone SL4

Zone SL3

Zone SL4

Zone SL5

Zone SL5

SDA SL1 SDA SL1

SDA SL2

SDA SL2

SDA SL2

SDA SL2

SDA SL3

SDA SL3SDA SL3

SDA SL3

SDA SL3

Digital Asset SL4

Digital Asset SL4

Digital Asset SL4

Digital Asset SL4

Digital Asset SL4

Digital Asset SL5

Digital Asset SL5

Digital Asset SL5

Digital Asset SL4

Zone SL3

Zone SL4

Digital Asset SL2

Networks not associated with the facility

Security measure

What does this mean forDefence-in-depth?

Page 15: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

Some conclusions

• Digital technologies bring unparalleled benefits

• Computer security defences are imperfect at best

• Deterrence is difficult, delay is problematic to quantify

• Defence-in-depth is important but different – diversity is significant

• Resilience to cyber-attack may require changing the architecture

• Cyber design basis threat is a difficult concept

• Blended attack scenarios are vital, vital, vital!

• This raises some difficult questions for organisations

Page 16: Differences between defence-in-depth for computer security and … · Differences between defence-in-depth for computer security and physical protection Mike StJohn-Green Independent

Differences between defence-in-depth for computer security and physical protection

Mike StJohn-Green

Independent consultant, UK

[email protected]