SlideShare a Scribd company logo
1 of 30
Presented by
Osama Salah
Application Whitelisting
Complimenting Threat Centric with Trust Centric Security
Application Whitelisting
Is Application
on whitelist?
Is Application
on Blacklist?
Deny! Don’t Run!
Run it!
Don’t Run!
Allow! Run it!
Yes
No
Yes
No
Threat
Centric
Trust
Centric
Else
Else
Default Allow
Default Deny
Blacklist Fail
Decision Rationale
Objective Q1. What do we
know more about,
the bad or the good?
Q2. Is it easy to
mange?
Malware Prevent malware from
executing.
The Good White List
But we do Black List
No (White List)
Yes (Black List)
Access
Control
Allow access to
employees only.
The Good White List Yes
No-Fly List Prevent known bad
people from getting on
planes.
The Bad Black List Yes
What is the Problem?
…in the context of this presentation.
Exponential Malware Growth
Source: AV-TEST, www.av-test.org
0
50
100
150
200
250
300
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014
Millions
Total Malware
New Malware
How are we typically
trying to solve the
problem?
Traditional Malware Prevention Stack
DataCenterFirewall
EndpointProtection
HostFWAntivirus
HIPS
AntiAPT
Firewall
WebFilterAntivirus
IPS
Firewall
WebFilterAntivirus
IPS
Antivirus Effectiveness
“When none of the antivirus scanners
detected a malware sample on the first day, it
took an average of two days for at least one
antivirus scanner to detect it”
“Over the course of 365 days, no single antivirus scanner had a perfect day - a day in which it caught every
new malware sample”
“After a year, there are
samples that 10% of the
scanners still do not
detect”
Source: lastline.com, Antivirus Isn’t Dead, It Just Can’t Keep Up
“On Day 0, only
51% of antivirus
scanners detected
new malware
samples”
“After two weeks, there was a
notable bump in detection rates
(up to 61%), indicating a
common lag time for antivirus
vendors”
How do we get infected today?
• Watering Hole Attacks
• Zero-Day Vulnerabilities
http://
where ever target
typically
hangs out
• Google says the best phishing scams have 45% success
rate (2014).
• FireEye on Spear Phishing: 70% open rate, 50% of those
click on links. (2012)
APT Protection
Turing Test in Reverse: New Sandbox-Evasion techniques
Seek Human Interaction (fireeye.com, June 2014)
“Cybersecurity is a constant arms race. Simulating mouse movement
and clicks is not enough to fool the most advanced sandbox-
evading malware. Now malware authors are incorporating real-world
behaviors into their evasion strategies.”
“Simulating these behaviors—the way actual people scroll documents,
click the mouse button, and move the cursor— is a huge challenge for
cybersecurity. Anticipating future evasion techniques might be even
tougher. Expect malware authors to employ more novel
techniques that look for that human touch.”
Microsoft phishing emails target corporate users, deliver
malware that evades sandboxes (scmagazine.com 02.2015)
Quarian Targeted-Attack Malware Evades Sandbox
Detection (blogs.mcafee.com 09.2014)
One additional prediction: To date, cybercriminals have
mainly focused on escaping application sandboxes.
However, increasingly popular standalone sandbox systems
offered by security software vendors pose a new hurdle for
cyberthieves. In response, cybercriminals have begun to
explore ways for their malware to escape from those sandbox
systems. Today a significant number of malware families
identify and evade sandbox-based detection.
(McAfee Labs Threat Report Nov. 2014)
Malware Authors Using New Techniques to Evade
Automated Threat Analysis Systems (symantec.com 10.2012)
An Independent test of APT attack detection appliances
(MRG Effitas and CrySyS Lab, Nov. 2014)
What are others saying?
Secure Standard Config
Application Whitelisting
Patch Applications
Patch Operating System
Minimize user with Admin priv.
Application Sec. Patching
“..prevents 85% of targeted
cyber intrusions..”
“…are the most effective means yet found to stop
the wave of targeted intrusions that are doing the
greatest damage to many organizations.”
Software Whitelisting
System Sec. Patching
No Admin Priv. Browsing/Emailing
Source: Gartner Hype Cycle for Infrastructure Protection, 2014
What is probably the most successful
App Whitelisting Implementation?
Why aren’t more enterprises implementing Whitelisting?
• Maturity and Culture
– Change Control, Admin Control on Workstations
– Software Asset Management discipline
– Balancing between security and operations
– Complaints Management
• It’s not easy
• Perception that its is not flexible
• Perception: Performance overhead, another agent on endpoints,
doesn’t play nice with AV
• Decision maker not impacted (Externality)
• Bad Marketing
It’s a Question of Trust…
• Trust the Solution
– Vulnerabilities or Evasion possible
– Risk Reduction not elimination
– Augmenting other controls not replacing
• Trust the Implementer
– Skills, capabilities, references
• Trust the Administrator
– Control through process and audits
Possible Enforcement Policies:
• Low: Allowed to run, monitor only
• Medium: Prompt Users, allow to run locally
• High: Block untrusted
• Run policies in monitoring mode (what if?)
• On Existing or new files
• Combine with Local or Global Approvals
• Combine with Reputation/Trust Level
It’s not all Black and White
Lessons Learnt:
Application Trust Policy Options
To put it in context, below some figures of our particular deployment
1.8 Million Unique Files
Collected over a period of approx. 6 months
1800 End Users 1300 Workstations 220 Servers
Trusted Publishers
48%
Signed Files
Non-Signed
Files
52%
~ 1.8 Million Files
~ 8300 Publishers
Trusted Publishers
“…the Darkhotel attackers are using a variety of digital certificates to sign
their malware. Attackers often employ stolen certificates in this way, but
the Darkhotel group seems to have taken a different tack, duplicating
legitimate certificates that have weak keys.”
Certificate Authority Hacks
Stolen Certificates
Code Signing System Hack
DigiNotar Files Bankruptcy in Wake of
Devastating Hack (09.2011)
Independent Iranian Hacker Claims
Responsibility for Comodo Hack (03.2011)
VeriSign Hit by Hackers in 2010 (02.2012)
Hackers Breached Adobe Server in Order to Sign
Their Malware (09.2012)Bit9 Hackerd into, the Criminals Seize Code-signing
Certificate (02.2013)
Sony attackers also stole certificates to sign malware
(02.2013)
Zeus malware found with valid digital signature (04.2014)
Certificates Revocation
HP accidentally signed malware, will revoke
certificate (10.2014)
Microsoft Revokes Certificates Used by Flame
Malware (06.2012)
Adobe to revoke code signing certificate (09.2012)
Weak Certificate Hack
Trusted Publishers
Some Issues
• Publisher dropping non-signed files.
• Publisher replacing previously signed files with non-signed files.
Application Whitelisting Features
• Typically you can put trusted publishers manually on a whitelist or
automate it by using reputational approval of the publisher.
• You also ban publishers.
• Publisher Check on new file detection
• Periodic Certificate re-check
• Exclude Weak Certificates
Trusted Directories
• Files located in a specific directory and executed
from it are allowed to deploy.
• Can be used to further lockdown updater policies by
limiting where the files need to be coming from like:
C:WSUSWsusContent
• Easy option if you can control what goes into the
Trusted Directory
• Don’t use with removable drives
Trusted User or Group
• Selected users can be granted permissions to
deploy software.
• Can be granted in urgent/exceptional cases.
Trusted Software Delivery System
• Software Distribution Systems like Microsoft SCCM, PDQ
Deploy…
• Software that updates itself like Adobe Reader, Chrome, AV
software etc.
• Patch Management Solutions (WSUS, …)
• Solutions come with a list of preconfigured Updaters
• Add updater rules manually, basically by selecting the
process that will do the updating.
Threat Levels
• Clean
• Potential Risk
• Malicious
• Unknown
Clean
26%
Unknown
74%
Trust Levels
0
200
400
600
800
1000
1200
1400
-1 0 1 2 3 4 5 6 7 8 9 10
Thousands
File Type Distribution (1.8M files)
76%
8%
7%
4%
5%
exe
msi
jar
dll
vb,reg
mui,sys
com,bat
Implementation Considerations
• Application whitelisting is augmenting existing
controls, it is not replacing them.
• Determine Scope of Deployment
– Workstations, Laptops, Servers..
• Determine the stakeholders and understand
how they will be impacted. Engage them early.
– End Users, Client Support, Systems Eng., Developers, Anyone
who currently has admin rights…
• Strategy: Stop the bleeding, cleanup later
Implementation Considerations
• Develop Application Whitelisting Policy & Procedure (align with
software asset management lifecycle)
– Obtaining, testing, approving, deploying, maintaining
• Why and how are new applications entering the company?
• New Deployments, Trial Software, Updates, Patching, Web
Download, Email, USB…
• What is the approval process? How can you automate it?
• Be ready to respond quickly (emergency), especially early on in
the project.
Benefits Summary
• Reduce number of malware incidents
• Zero-Day Protection
• Improve security of end-of-life or hard to patch endpoints
• Detect insider threats or bad behavior
• Improved forensic capabilities (Data, Drift Reports, Snapshots)
• Better Change management will require better planning and can
lead to less downtime
• Permit usage of USB devices (if the risk is introducing malware not
data leakage)
THANK YOU FOR YOUR TIME

More Related Content

What's hot

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
top-50-cybersecurity-threats.pdf
top-50-cybersecurity-threats.pdftop-50-cybersecurity-threats.pdf
top-50-cybersecurity-threats.pdfnowplanettv1
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to MetasploitGTU
 
Honeypot based intrusion detection system PPT
Honeypot based intrusion detection system PPTHoneypot based intrusion detection system PPT
Honeypot based intrusion detection system PPTparthan t
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security SolutionsThe TNS Group
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020Jose Palanco
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinetinternetbrasil
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIMAlienVault
 
Enterprise Vulnerability Management - ZeroNights16
Enterprise Vulnerability Management - ZeroNights16Enterprise Vulnerability Management - ZeroNights16
Enterprise Vulnerability Management - ZeroNights16Alexander Leonov
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 

What's hot (20)

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
top-50-cybersecurity-threats.pdf
top-50-cybersecurity-threats.pdftop-50-cybersecurity-threats.pdf
top-50-cybersecurity-threats.pdf
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
 
Honeypot based intrusion detection system PPT
Honeypot based intrusion detection system PPTHoneypot based intrusion detection system PPT
Honeypot based intrusion detection system PPT
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
Snort
SnortSnort
Snort
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
4 palo alto licenses
4 palo alto licenses4 palo alto licenses
4 palo alto licenses
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIM
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Enterprise Vulnerability Management - ZeroNights16
Enterprise Vulnerability Management - ZeroNights16Enterprise Vulnerability Management - ZeroNights16
Enterprise Vulnerability Management - ZeroNights16
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 

Viewers also liked

Fa ct presentation 5.25.10
Fa ct presentation 5.25.10Fa ct presentation 5.25.10
Fa ct presentation 5.25.10Healthy City
 
Using HealthyCity.org to upload your own data for planning and policy change
Using HealthyCity.org to upload your own data for planning and policy changeUsing HealthyCity.org to upload your own data for planning and policy change
Using HealthyCity.org to upload your own data for planning and policy changeHealthy City
 
Media workplace research methods
Media workplace research methods Media workplace research methods
Media workplace research methods Julian McDougall
 
Healthy City presentation in Monterey & Salinas 3.14.12
Healthy City presentation in Monterey & Salinas 3.14.12Healthy City presentation in Monterey & Salinas 3.14.12
Healthy City presentation in Monterey & Salinas 3.14.12Healthy City
 
Healthy City Community Planning and Development webinar
Healthy City Community Planning and Development webinarHealthy City Community Planning and Development webinar
Healthy City Community Planning and Development webinarHealthy City
 
The Gospel Demands A Godly Attitude- Chapter 12
The Gospel Demands A Godly Attitude-  Chapter 12The Gospel Demands A Godly Attitude-  Chapter 12
The Gospel Demands A Godly Attitude- Chapter 12Don McClain
 
Healthy City Hands On Training For Partners 3 26 10
Healthy City Hands On Training For Partners 3 26 10Healthy City Hands On Training For Partners 3 26 10
Healthy City Hands On Training For Partners 3 26 10Healthy City
 
Пушкин "Образы ЕО"
Пушкин "Образы ЕО"Пушкин "Образы ЕО"
Пушкин "Образы ЕО"gueste296b43
 
超卡哇伊的動物
超卡哇伊的動物超卡哇伊的動物
超卡哇伊的動物k87414
 
Ppt With Speaker Notes
Ppt With Speaker NotesPpt With Speaker Notes
Ppt With Speaker Notesasa assa
 
Claves para la implementacion de tendencias y enfoques carmen sofia prada
Claves para la implementacion de tendencias y enfoques  carmen sofia pradaClaves para la implementacion de tendencias y enfoques  carmen sofia prada
Claves para la implementacion de tendencias y enfoques carmen sofia pradaSANDRA SILVA
 
Ya reader's advisory
Ya reader's advisoryYa reader's advisory
Ya reader's advisorysonofrich
 
Immigrant Health Paradox
Immigrant Health Paradox Immigrant Health Paradox
Immigrant Health Paradox Healthy City
 
Healthy City WEBINAR Introductory Training
Healthy City WEBINAR Introductory TrainingHealthy City WEBINAR Introductory Training
Healthy City WEBINAR Introductory TrainingHealthy City
 
Promdex.com
Promdex.comPromdex.com
Promdex.comVladimi
 
Why Were You Baptized
Why Were You BaptizedWhy Were You Baptized
Why Were You BaptizedDon McClain
 

Viewers also liked (20)

Historiaurrea
HistoriaurreaHistoriaurrea
Historiaurrea
 
Fa ct presentation 5.25.10
Fa ct presentation 5.25.10Fa ct presentation 5.25.10
Fa ct presentation 5.25.10
 
Using HealthyCity.org to upload your own data for planning and policy change
Using HealthyCity.org to upload your own data for planning and policy changeUsing HealthyCity.org to upload your own data for planning and policy change
Using HealthyCity.org to upload your own data for planning and policy change
 
P41 Thompson Jp[1]
P41 Thompson Jp[1]P41 Thompson Jp[1]
P41 Thompson Jp[1]
 
Media workplace research methods
Media workplace research methods Media workplace research methods
Media workplace research methods
 
Healthy City presentation in Monterey & Salinas 3.14.12
Healthy City presentation in Monterey & Salinas 3.14.12Healthy City presentation in Monterey & Salinas 3.14.12
Healthy City presentation in Monterey & Salinas 3.14.12
 
Healthy City Community Planning and Development webinar
Healthy City Community Planning and Development webinarHealthy City Community Planning and Development webinar
Healthy City Community Planning and Development webinar
 
The Gospel Demands A Godly Attitude- Chapter 12
The Gospel Demands A Godly Attitude-  Chapter 12The Gospel Demands A Godly Attitude-  Chapter 12
The Gospel Demands A Godly Attitude- Chapter 12
 
Healthy City Hands On Training For Partners 3 26 10
Healthy City Hands On Training For Partners 3 26 10Healthy City Hands On Training For Partners 3 26 10
Healthy City Hands On Training For Partners 3 26 10
 
Пушкин "Образы ЕО"
Пушкин "Образы ЕО"Пушкин "Образы ЕО"
Пушкин "Образы ЕО"
 
超卡哇伊的動物
超卡哇伊的動物超卡哇伊的動物
超卡哇伊的動物
 
Pre
PrePre
Pre
 
Ppt With Speaker Notes
Ppt With Speaker NotesPpt With Speaker Notes
Ppt With Speaker Notes
 
Claves para la implementacion de tendencias y enfoques carmen sofia prada
Claves para la implementacion de tendencias y enfoques  carmen sofia pradaClaves para la implementacion de tendencias y enfoques  carmen sofia prada
Claves para la implementacion de tendencias y enfoques carmen sofia prada
 
Ya reader's advisory
Ya reader's advisoryYa reader's advisory
Ya reader's advisory
 
Immigrant Health Paradox
Immigrant Health Paradox Immigrant Health Paradox
Immigrant Health Paradox
 
Healthy City WEBINAR Introductory Training
Healthy City WEBINAR Introductory TrainingHealthy City WEBINAR Introductory Training
Healthy City WEBINAR Introductory Training
 
Promdex.com
Promdex.comPromdex.com
Promdex.com
 
Why Were You Baptized
Why Were You BaptizedWhy Were You Baptized
Why Were You Baptized
 
Web2 0
Web2 0Web2 0
Web2 0
 

Similar to Application Whitelisting - Complementing Threat centric with Trust centric security

2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOKBoris Loukanov
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya
 
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUAnatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUUniversity of Essex
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat RansomwareIvanti
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmAlienVault
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0Rafal Los
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
Software quality assurance and cyber security
Software quality assurance and cyber securitySoftware quality assurance and cyber security
Software quality assurance and cyber securityNascenia IT
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerShivamSharma909
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 

Similar to Application Whitelisting - Complementing Threat centric with Trust centric security (20)

2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
 
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUAnatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Software quality assurance and cyber security
Software quality assurance and cyber securitySoftware quality assurance and cyber security
Software quality assurance and cyber security
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Malware
MalwareMalware
Malware
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Application Whitelisting - Complementing Threat centric with Trust centric security

  • 1. Presented by Osama Salah Application Whitelisting Complimenting Threat Centric with Trust Centric Security
  • 2. Application Whitelisting Is Application on whitelist? Is Application on Blacklist? Deny! Don’t Run! Run it! Don’t Run! Allow! Run it! Yes No Yes No Threat Centric Trust Centric Else Else Default Allow Default Deny
  • 4. Decision Rationale Objective Q1. What do we know more about, the bad or the good? Q2. Is it easy to mange? Malware Prevent malware from executing. The Good White List But we do Black List No (White List) Yes (Black List) Access Control Allow access to employees only. The Good White List Yes No-Fly List Prevent known bad people from getting on planes. The Bad Black List Yes
  • 5. What is the Problem? …in the context of this presentation.
  • 6. Exponential Malware Growth Source: AV-TEST, www.av-test.org 0 50 100 150 200 250 300 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 Millions Total Malware New Malware
  • 7. How are we typically trying to solve the problem?
  • 8. Traditional Malware Prevention Stack DataCenterFirewall EndpointProtection HostFWAntivirus HIPS AntiAPT Firewall WebFilterAntivirus IPS Firewall WebFilterAntivirus IPS
  • 9. Antivirus Effectiveness “When none of the antivirus scanners detected a malware sample on the first day, it took an average of two days for at least one antivirus scanner to detect it” “Over the course of 365 days, no single antivirus scanner had a perfect day - a day in which it caught every new malware sample” “After a year, there are samples that 10% of the scanners still do not detect” Source: lastline.com, Antivirus Isn’t Dead, It Just Can’t Keep Up “On Day 0, only 51% of antivirus scanners detected new malware samples” “After two weeks, there was a notable bump in detection rates (up to 61%), indicating a common lag time for antivirus vendors”
  • 10. How do we get infected today? • Watering Hole Attacks • Zero-Day Vulnerabilities http:// where ever target typically hangs out • Google says the best phishing scams have 45% success rate (2014). • FireEye on Spear Phishing: 70% open rate, 50% of those click on links. (2012)
  • 11. APT Protection Turing Test in Reverse: New Sandbox-Evasion techniques Seek Human Interaction (fireeye.com, June 2014) “Cybersecurity is a constant arms race. Simulating mouse movement and clicks is not enough to fool the most advanced sandbox- evading malware. Now malware authors are incorporating real-world behaviors into their evasion strategies.” “Simulating these behaviors—the way actual people scroll documents, click the mouse button, and move the cursor— is a huge challenge for cybersecurity. Anticipating future evasion techniques might be even tougher. Expect malware authors to employ more novel techniques that look for that human touch.” Microsoft phishing emails target corporate users, deliver malware that evades sandboxes (scmagazine.com 02.2015) Quarian Targeted-Attack Malware Evades Sandbox Detection (blogs.mcafee.com 09.2014) One additional prediction: To date, cybercriminals have mainly focused on escaping application sandboxes. However, increasingly popular standalone sandbox systems offered by security software vendors pose a new hurdle for cyberthieves. In response, cybercriminals have begun to explore ways for their malware to escape from those sandbox systems. Today a significant number of malware families identify and evade sandbox-based detection. (McAfee Labs Threat Report Nov. 2014) Malware Authors Using New Techniques to Evade Automated Threat Analysis Systems (symantec.com 10.2012) An Independent test of APT attack detection appliances (MRG Effitas and CrySyS Lab, Nov. 2014)
  • 12. What are others saying? Secure Standard Config Application Whitelisting Patch Applications Patch Operating System Minimize user with Admin priv. Application Sec. Patching “..prevents 85% of targeted cyber intrusions..” “…are the most effective means yet found to stop the wave of targeted intrusions that are doing the greatest damage to many organizations.” Software Whitelisting System Sec. Patching No Admin Priv. Browsing/Emailing
  • 13. Source: Gartner Hype Cycle for Infrastructure Protection, 2014
  • 14. What is probably the most successful App Whitelisting Implementation?
  • 15. Why aren’t more enterprises implementing Whitelisting? • Maturity and Culture – Change Control, Admin Control on Workstations – Software Asset Management discipline – Balancing between security and operations – Complaints Management • It’s not easy • Perception that its is not flexible • Perception: Performance overhead, another agent on endpoints, doesn’t play nice with AV • Decision maker not impacted (Externality) • Bad Marketing
  • 16. It’s a Question of Trust… • Trust the Solution – Vulnerabilities or Evasion possible – Risk Reduction not elimination – Augmenting other controls not replacing • Trust the Implementer – Skills, capabilities, references • Trust the Administrator – Control through process and audits
  • 17. Possible Enforcement Policies: • Low: Allowed to run, monitor only • Medium: Prompt Users, allow to run locally • High: Block untrusted • Run policies in monitoring mode (what if?) • On Existing or new files • Combine with Local or Global Approvals • Combine with Reputation/Trust Level It’s not all Black and White
  • 18. Lessons Learnt: Application Trust Policy Options To put it in context, below some figures of our particular deployment 1.8 Million Unique Files Collected over a period of approx. 6 months 1800 End Users 1300 Workstations 220 Servers
  • 19. Trusted Publishers 48% Signed Files Non-Signed Files 52% ~ 1.8 Million Files ~ 8300 Publishers
  • 20. Trusted Publishers “…the Darkhotel attackers are using a variety of digital certificates to sign their malware. Attackers often employ stolen certificates in this way, but the Darkhotel group seems to have taken a different tack, duplicating legitimate certificates that have weak keys.” Certificate Authority Hacks Stolen Certificates Code Signing System Hack DigiNotar Files Bankruptcy in Wake of Devastating Hack (09.2011) Independent Iranian Hacker Claims Responsibility for Comodo Hack (03.2011) VeriSign Hit by Hackers in 2010 (02.2012) Hackers Breached Adobe Server in Order to Sign Their Malware (09.2012)Bit9 Hackerd into, the Criminals Seize Code-signing Certificate (02.2013) Sony attackers also stole certificates to sign malware (02.2013) Zeus malware found with valid digital signature (04.2014) Certificates Revocation HP accidentally signed malware, will revoke certificate (10.2014) Microsoft Revokes Certificates Used by Flame Malware (06.2012) Adobe to revoke code signing certificate (09.2012) Weak Certificate Hack
  • 21. Trusted Publishers Some Issues • Publisher dropping non-signed files. • Publisher replacing previously signed files with non-signed files. Application Whitelisting Features • Typically you can put trusted publishers manually on a whitelist or automate it by using reputational approval of the publisher. • You also ban publishers. • Publisher Check on new file detection • Periodic Certificate re-check • Exclude Weak Certificates
  • 22. Trusted Directories • Files located in a specific directory and executed from it are allowed to deploy. • Can be used to further lockdown updater policies by limiting where the files need to be coming from like: C:WSUSWsusContent • Easy option if you can control what goes into the Trusted Directory • Don’t use with removable drives
  • 23. Trusted User or Group • Selected users can be granted permissions to deploy software. • Can be granted in urgent/exceptional cases.
  • 24. Trusted Software Delivery System • Software Distribution Systems like Microsoft SCCM, PDQ Deploy… • Software that updates itself like Adobe Reader, Chrome, AV software etc. • Patch Management Solutions (WSUS, …) • Solutions come with a list of preconfigured Updaters • Add updater rules manually, basically by selecting the process that will do the updating.
  • 25. Threat Levels • Clean • Potential Risk • Malicious • Unknown Clean 26% Unknown 74% Trust Levels 0 200 400 600 800 1000 1200 1400 -1 0 1 2 3 4 5 6 7 8 9 10 Thousands
  • 26. File Type Distribution (1.8M files) 76% 8% 7% 4% 5% exe msi jar dll vb,reg mui,sys com,bat
  • 27. Implementation Considerations • Application whitelisting is augmenting existing controls, it is not replacing them. • Determine Scope of Deployment – Workstations, Laptops, Servers.. • Determine the stakeholders and understand how they will be impacted. Engage them early. – End Users, Client Support, Systems Eng., Developers, Anyone who currently has admin rights… • Strategy: Stop the bleeding, cleanup later
  • 28. Implementation Considerations • Develop Application Whitelisting Policy & Procedure (align with software asset management lifecycle) – Obtaining, testing, approving, deploying, maintaining • Why and how are new applications entering the company? • New Deployments, Trial Software, Updates, Patching, Web Download, Email, USB… • What is the approval process? How can you automate it? • Be ready to respond quickly (emergency), especially early on in the project.
  • 29. Benefits Summary • Reduce number of malware incidents • Zero-Day Protection • Improve security of end-of-life or hard to patch endpoints • Detect insider threats or bad behavior • Improved forensic capabilities (Data, Drift Reports, Snapshots) • Better Change management will require better planning and can lead to less downtime • Permit usage of USB devices (if the risk is introducing malware not data leakage)
  • 30. THANK YOU FOR YOUR TIME