Your SlideShare is downloading. ×

It's Your Move: The Changing Game of Endpoint Security

911

Published on

It’s time to refine enterprise security strategies at your organization. While we were installing firewalls, antivirus suites, and other technologies that block known threats, the bad guys were out …

It’s time to refine enterprise security strategies at your organization. While we were installing firewalls, antivirus suites, and other technologies that block known threats, the bad guys were out rewriting the rulebook. Don't let cybercriminals stay one step ahead and put you in “checkmate.”

In this information-packed presentation, you'll learn:

* How our opponents have changed the IT security rules

* What role your employees play in this “game”

* Key moves IT security professionals can make to regain control of endpoints

* How one organization has implemented a proactive security approach successfully

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
911
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
66
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • © Copyright 2008 - Lumension Security
  • Defense in Depth Strategy Address the core IT Risk with Patch & Configuration Management Stop unwanted / untrusted change with Application Control Protect against insider risk Device Control Deploy a broad defensive perimeter with AntiVirus Reduce endpoint complexity with an Endpoint Management and Security Suite
  • Most overflows result in a system crash Occasionally, a vulnerability is discovered that allows the “overflowed” code to be executed That execution typically escapes any established security controls Because buffers are small and these attacks are difficult, many overflows attacks will try to download a more substantial payload
  • Application control or whitelisting provides a new layer in the foundation for endpoint protection. Whitelisting is about identifying the known good and by default not letting anything other than what’s on the whitelist from executing. Simply put, any executable – whether a business application, a video driver, or a web browser plug-in – not specified on the whitelist cannot load and run. It’s the most effective security layer as its prevents execution in the kernel.
  • On top of defense-in-depth, time to shift from threat-centric approach to one based on trust….
  • Trust Engine Challenge . Organizations need an automated method by which to determine whether or not to allow changes to the code running on their network assets, particularly the endpoints, in order to make the promise of application whitelisting operationally feasible. Without this, changes to the whitelist had to be made manually and oftentimes without any basis. The challenge is to implement a process by which changes can be automatically vetted and installed on network assets. Feature . LEMSS:AC allows any number of trust policies to be created and implemented which will automate the process of assessing the security and desirability of changes to programs running on network assets; these trust mechanisms allow for the automated or user-driven changes to the “known good” whitelist required in dynamic environments such as desktops and laptops without completely surrendering control over these changes. These trust mechanisms include: Trusted Publisher , Trusted Updater , Trusted Path , and Local Authorization . Benefit . This permits the organization to provide the higher level of security against malware and other undesirable programs available from a whitelisting / “default deny” approach without the additional administrative burden sometimes associated with it. Some specific examples of how the Trust Engine might help operationalize whitelisting in a real IT network with dynamic environments such as desktops or laptops include: Trusted Publisher (i.e., from a known good vendor with a signed certificate) – the organization may have whitelisted a specific Microsoft Operating System (OS) and applications (e.g., Word, Excel and Powerpoint) but finds that some users may want to add certain OS capabilities (such as additional drivers) or applications (such as Visio) from Microsoft; by implementing a policy which permits changes to the whitelist when those changes are accompanied by a valid, signed certificate from Microsoft, these changes could be made “on the fly” by the end user without additional work for the system administrators. Trusted Updater (i.e., from a known good process which updates existing software) – the organization may be using an automated patching solution (such as Lumension Patch and Remediation) or have certain continuously updated programs (such as WebEx) on their whitelist. Here again, by implementing a policy which permits changes to the whitelist when those changes are made by these specific programs, these changes could be made automatically without adding to the administrative burden. Trusted Path (i.e., from a known good location, generally inside the network) – it is not uncommon for IT administrators to create a library of known good applications, which is used when installing or updating an endpoint; organizations might want to restrict all endpoint changes to only those which come from this “source repository.” By creating / using a trusted path policy (and carefully controlling access to this “source repository”), the whitelist can be updated as changes are made in the library of known good applications. Local Authorization (i.e., allow specific users to self-authorize applications) – in some cases, an organization might allow specific users to augment the whitelist of known good applications under their own say-so, be they administrators or even end users; for instance, perhaps a “well known” salesman is on a customer call and needs to update her machine to allow her presentation to work on the customer’s equipment. This trust mechanism provides a way to permit these ad hoc changes while providing the traceability and control needed to ensure that, should they prove unwise, they can be reversed.
  • Vulnerabilities affecting a typical end-user PC from 2007-2009 almost doubled from 220 to 420 and its expected to double again in 2010 (Secunia Half Year Report 2010) A PC with 50 programs installed had 3.5 times more vulnerabilities in the 24 third party programs installed than in the 26 Microsoft programs installed. It is expected that this ratio will increase to 4.4 in 2010. ( Secunia Half Year Report 2010) Discover: Gain complete visibility of all IT assets, both managed and unmanaged. Assess: Perform a deep analysis and thorough OS, application and security configuration vulnerability assessments. Prioritize: Focus on your most critical security risks first. Remediate: Automatically deploy patches to an entire network per defined policy to support all OS’s and applications. Report: Provide operational and management reports that consolidate discovery, assessment and remediation information on a single management console.
  • Using Lumension Device Control, you can mitigate these insider risks by: Enforcing a device and media access policy on your endpoints which won’t impede the productivity of the business Enforcing a data encryption policy for removable storage devices and media to protect that valuable data when is copied off of your endpoints, and by -Monitoring what’s happening in your environment; You can manage and report on all endpoint activity in your organization
  • Transcript

    • 1. It’s Your Move: The Changing Game of Endpoint Security
    • 2. Today’s Speakers Paul Henry Security & Forensics Analyst MCP+I, MCSE, CCSA, CCSE, CFSA, CFSO, CISSP,-ISSAP, CISM, CISA, CIFI, CCE Paul Zimski VP of Solution Strategy Lumension Doug Walls CIO EMSolutions Jason Brown Network Engineer EMSolutions
    • 3. Today’s Agenda How the “Bad Guys” Changed the Rules Key Moves We Can Make to Regain Control Real World IT Security Experience Q&A
    • 4. How the “Bad Guys” Have Changed the Rules
    • 5. Current Day Recipe For Disaster
      • Perform below steps 1 to 5.
        • Bait an End User with Spear Phishing
        • Exploit a Vulnerability
        • Download a Back Door
        • Establish a Back Channel
        • Explore and Steal
      • Select another victim.
      • Repeat.
    • 6. Advanced Persistent Threats Highly skilled Cyber Armies unleashing new Advanced Malware…. While many of these attacks are well organized, they have simply taken advantage of the same old mistakes we’ve been making for years.
    • 7. Our Flaw Remediation Is Missing The Target
      • Since 2009 the most hacked software was 3rd party apps and browser add-ons like Adobe and Quicktime.
      • Yet we still today focus our attention on patching Microsoft OS/Applications.
      The bad guys know it… and are taking full advantage
    • 8. Traditional AV Can No Longer Keep Up
      • More than 73,000 new malware instances every day.
      • Obfuscation has effectively rendered traditional signature based defenses useless.
      • Polymorphic malware that alters its signature with each infection has become commonplace.
      Our defenses must evolve!
    • 9. What Did We Expect Was Going To Happen?
      • We are using the same defenses that failed us for the last decade…
        • Focused on the gateway - and we have neglected our endpoints.
        • Focused on blocking the delivery of malware - not preventing its execution.
      Unless we make a definitive change in our defenses, we can expect the same results…
    • 10. Next Generation Malware Has Arrived
      • Instead of the infected machine waiting for a connection to be made from outside, the infected machine makes the connection itself.
      • Introduces a new technique of code injection – Flux writes code directly into a host process and executes it there.
      • Circumvents several desktop firewalls and makes it nearly invisible to current anti-malware software.
      Flux is a new Trojan spreading covertly through the internet.
    • 11. If a “bad guy” can…
      • Persuade you to run his program on your computer...
      • Alter the operating system on your computer…
      • Gain unrestricted physical access to your computer…
      • Upload programs to your website…
      • Crack your passwords…
      … it’s not your computer, website or data anymore.
    • 12. At the End of the Day…
      • It doesn’t matter what attack vector is used…
      • the “bad guys" are trying to install and run code on your machines to gain unauthorized control!
    • 13. Key Moves We Can Make Against the “Bad Guys” to Regain Control
    • 14.
      • Implement Defense-in-Depth Endpoint Security
      • Shift from Threat-Centric to Trust-Based Security
      • Focus on the Operational Basics
      • Manage Those Devices
      Key Moves You Can Make
    • 15. Strategy 1: Implement Defense-in-Depth Traditional Endpoint Security Defense-N-Depth Blacklisting As The Core Zero Day 3 rd Party Application Risk Malware As a Service Volume of Malware Patch & Configuration Mgmt.
    • 16.
      • Antivirus will provide some protection against known payloads, and remains a good layer for known malware detection and removal
      • However as attack sophistication and targeting increases, malware becomes less effective as a primary defense
      • Application control is a much better defense to stop unknown payloads from installing
      Strategy 2: Stop Malware Payloads
    • 17. What is Application Whitelisting? Malware Applications
      • Authorized
      • Operating Systems
      • Business Software
      • Known
      • Viruses
      • Worms
      • Trojans
      • Unauthorized
      • Games
      • iTunes
      • Shareware
      • Unlicensed S/W
      • Unknown
      • Viruses
      • Worms
      • Trojans
      • Keyloggers
      • Spyware
      Un-Trusted
    • 18. Trust-Based Security
    • 19. Flexible Trust
      • Trusted Publisher
      • Authorizes applications based on the vendor that “published” them through the digital signing certificate.
      • Trusted Updater
      • Authorizes select systems management solutions to “update” software, patches and custom remediations, while automatically updating them to the whitelist.
      • Trusted Path
      • Authorizes applications to run based on their location.
      • Local Authorization
      • Allows end-users to locally authorize applications which have not been otherwise trusted by the whitelist or any other trust rules.
    • 20. Strategy 3: Focus on the Operational Basics Source: Aberdeen Group, Managing Vulnerabilities and Threats (No, Anti-Virus is Not Enough), December 2010 Assess Prioritize Remediate Repeat
      • Identify all IT assets (including platforms, operating systems, applications, network services)
      • Monitor external sources for vulnerabilities, threats and intelligence regarding remediation
      • Scan all IT assets on a regular schedule for vulnerabilities, patches and configurations
      • Maintain an inventory of IT assets
      • Maintain a database of remediation intelligence
      • Prioritize the order of remediation as a function of risk, compliance, audit and business value
      • Model / stage / test remediation before deployment
      • Deploy remediation (automated, or manually)
      • Train administrators and end-users in vulnerability management best practices
      • Scan to verify success of previous remediation
      • Report for audit and compliance
      • Continue to assess, prioritize and remediate
    • 21. Rethink Your Patch Strategy Source: 1 - SANS Institute
      • The top security priority is “patching client-side software” 1
        • Streamline patch management and reporting across OS’s AND applications
      • Patch and defend is not just a Microsoft issue
        • More than 2/3 of today’s vulnerabilities come from non-Microsoft applications
    • 22. Stop Unwanted Applications
        • Immediate and simple risk mitigation
      Denied Application Policy prevents unwanted applications even if they are already installed Easily remove unwanted applications
    • 23. Reduce Local Administrator Risk
        • Limit Local Admin Usage
        • Monitor and Control existing Local Admins
    • 24. Strategy 4: Manage those Devices
    • 25. Real World IT Security Experience
    • 26. EMSolutions
      • Headquartered in Arlington, VA
        • Established in May 2000
        • Four Satellite Offices
      • Systems Engineering, Information Technology and Information Assurance, Science and Advanced Technology Solutions, and Modeling and Simulation for Government Organizations
    • 27. IT Security Challenges
      • Control use of removable devices on customer network
        • Monitor and control data entering and leaving network
        • Audit any and all use of peripherals and media introduced to the network
      • Protect dedicated infrastructure that supports unclassified and corporate work
        • Ensure constant uptime of hot desks
        • Limit risk from local admin users
        • Prevent execution of unwanted and malicious apps
        • Current AV solution was not effective in preventing the issues
    • 28. Addressing the Challenge
      • Implemented Lumension ® Endpoint Management and Security Suite (L.E.M.S.S.)
        • Easy process to install, set up and maintain the application whitelist with all currently used corporate OSes and software
        • Shifted from another antivirus provider to the AV module within L.E.M.S.S.
      • Educated users about potential external threats and internal problems that could arise from lack of precaution
    • 29. Results
      • Improved Security
        • Eliminated malware outbreaks
        • More robust patch management
      • Improved User Productivity
        • Optimized performance of end user PCs
        • Reduced IT help desk calls/complaints from users regarding malware-related PC issues
      • Improved IT Productivity
        • Visibility into endpoints, apps and configurations
        • Minimized time required for endpoint maintenance and user education
        • Reduced admin burden by managing one solution
    • 30. Q&A
    • 31.
      • Global Headquarters
      • 8660 East Hartford Drive
      • Suite 300
      • Scottsdale, AZ 85255
      • 1.888.725.7828
      • [email_address]
      • http://blog.lumension.com

    ×