SlideShare a Scribd company logo
1 of 3
Download to read offline
S e c u r i t y a n d C o m p l i a n c e : M o n i t o r i n g , c o n t r o l l i n g , a n d c h a n g e s P a g e | 1
Monitoring your
organization
against threats
Critical System Control
Montreal, April 24, 2014
By Marc-Andre Heroux
CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM
Compliance & Security Advisor
ll organizations are facing various types
of threats. Threats can come from
inside, outside your organization or
from both. This article focus on monitoring
informational resources against all types of
threats threatening your critical functions
supported by electronic assets such as servers,
desktops, switches, routers, firewalls, etc.
Today, some people think that keeping a system
or a state hidden make a system more secure.
Probably because of my own experiences and
knowledge about Cyber Security, I see things
little bit differently from many other experts.
Over the last 17 years, I have implemented and
conducted security assessments against many
types of critical systems, and often connected to
the Internet.
Critical public systems such as DNS, Web, Mail,
VPN using various types of authentication
mechanisms such as saslauthd, oauth2, SAML,
etc. against Oracle, MySQL, MS-SQL and using
many types of technologies such as secure
LDAP or SSL can be easily discovered by
attackers.
Why monitoring for potential threats?
Simple: organizations are getting more and more
interconnected and thinking that the obscurity
can be considered as a security control is similar
to me to ignoring the new reality of
Interconnected Networks and the risk
surrounding the Internet.
As a security specialist I share the same
approach as the Kerckhoffs's principlei
, also
formulated by Claude Shannon as the enemy
knows the system and widely used by
cryptographers as opposed to security by
obscurity: “a critical system can be known and
be secure”.
For a critical system connected to the Internet, I
recommend to keep it up-to-date (ex.: latest
kernels, modules, etc.), continuously monitor
against threats and abnormal activities and
correct issues when detected by the
implementation or the correction of a physical,
operational, administrative or technical controls.
I do also recommend to use application controls
such as whitelisting and implement an IPS (if
data flow are critical, IDS mode is usually
preferable).
For critical system not connected to the Internet
or not connected to a network (no access in, no
access out), my recommendations are different
and vary in function of many elements. This
article explain you what are the basics elements
you may have to consider to choose the proper
controls.
Lock and monitor
Most knowledgeable security specialists agree
and understand that we “monitor” traffic for
critical activities such as bank transactions,
Programmable Logic Controller (PLC) and
critical computers used by industrial
organizations (e.g.: energy) with IDS and that
we do not use IPS. It’s the same situation with
the use of anti-malware technical controls on
very critical isolated systems, it’s often
preferable to have a system state unchanged and
operationally functional and receive an alert
regarding a potential suspicious activity or an
alarm when abnormal activity is detected as
opposed to block a system execution. Blocking
valid activity could potentially generate a
negative business impact while the control is
A
S e c u r i t y a n d C o m p l i a n c e : M o n i t o r i n g , c o n t r o l l i n g , a n d c h a n g e s P a g e | 2
A u t h o r : M a r c - A n d r e H e r o u x
Monitoring your organization against threats
Critical System Control
supposed to protect. This is one of the main
reason why some very critical and isolated
system are simply not running anti-malware, IPS
or specific technical control against threats and
rely on strict procedure and acceptable practices.
We must remember that subnets must be
segregated and if necessary, multi-level DMZ
must be implemented and virtual routing and
forwarding as well as 802.1Q tunneling must be
used carefully. Conducting a risk assessment
including a risk analysis and a business impact
assessment allow to establish the proper
orientation and select the proper controls. Such
experts understand when it is preferable to use
an IPS (often against Internet threats in TCP
segments and never on against frames of internal
networks when critical system are involved
(e.g.: Ethernet II). This apply to all organizations
conducting critical activities such as banks,
energy, industrial, etc.
Monitoring traffic is crucial and is often
mandatory (e.g.: NERCii
). Filtering and
blocking malicious traffics is often optional, but
I usually suggest IPS to detect and block threats
in incoming/outgoing traffics from boundaries
of critical perimeters (e.g.: Internet to Intranet,
Intranet to critical perimeter gateways), but
never in electronic security perimeters (ESP)
where blocking valid traffics could lead to
various operational disaster scenarios. Real-time
monitoring of firewalls and other security
sensors is required to rapidly detect and initiate
response to cyber incidents.iii
Security and Compliance involve by default:
exception, justification and compensatory
measures. In all organizations, there are
situations where it is considered more secured
with reason to not apply any changes to a
specific system (ex.: a HSM bank system remain
usually unchanged, mainframes and Unix
systems are other examples, especially in
industrial organizations (ex.: in the energy
sector, Technical Feasibility Exceptions (TFE)
can justify the exemption of running a protective
control such as an anti-malware or applying any
update like system or firmware update, etc.).
Security paradigm
Despite it is usually considered unsecured to
keep a system unchanged, as previously
explained, it is sometimes the only way to keep
it to an acceptable security posture considering
the potential impacts of loss, especially when
systems are isolated and very critical. In those
situations, a justification (e.g.: ticket,
derogation, statement of applicability, etc.) must
be provided in order to document the reasons
and duration of the exception in time.
An organization can be compliant and secure
while system are unchanged during a long period
of time (e.g.: years) and it is important to
understand this reality in large corporations
conducting critical activities. Not all systems can
remain secured while unchanged, usually
systems isolated in restricted networks or not
interconnected to a computer network are valid
examples.
This is where compensatory measures are
especially important (e.g.: the Stuxnet virusiv
was able to infect critical systems, particularly
IDSIDS
sensor
S e c u r i t y a n d C o m p l i a n c e : M o n i t o r i n g , c o n t r o l l i n g , a n d c h a n g e s P a g e | 3
A u t h o r : M a r c - A n d r e H e r o u x
Monitoring your organization against threats
Critical System Control
because of a lack of procedures surrounding the
acceptable uses of USB keys). The uses of USB
keys against critical systems must be strictly
controlled and ideally avoided. The use of an
infected USB key could be very risky lead to
disclosure and modification of information and
in some cases, to system dis-functionality and
disruption. It appears that good practices and
appropriate procedures in the management of
critical system permits to many organizations to
remain safe against technical threats while
monitoring abnormal activities.
For critical system, we often suggest to apply
controls to maintain a system unchanged and
monitor it to abnormal behaviours or
modifications. As opposed to general security
practices suggesting regular systems updates,
critical systems (ex: industrial, bank) must
remain unchanged during a long period and be
monitored for abnormal activities or behaviours.
This approach: “controlling and monitoring” can
be very effective. Technically, the most
challenging aspects while controlling and
monitoring activities, are selecting the proper
i
David Salomon, “Kerckhoffs's principle”
Data Privacy and Security: Encryption and Information
Hiding , 2003, ISBN 0-387-00311-8,
P. 15,435.
ii
North American Electric Reliability Corporation (NERC)
CIP-005-4 R3, Monitoring Electronic Access
iii
Keith Stouffer, Joe Falco, Karen Scarfone, National Institute
controls (e.g.: McAfee Application Control,
Tripwire, etc.), IDS location (e.g.: boundaries of
perimeters) where the sensors send capture logs,
the sensors emplacement and the type of traffic
to monitor (e.g.: UDP, TCP, Ethernet II).
Remember, monitoring local traffic is necessary
to be able to detect layer 2 threats (e.g.: MAC
Address attack).
As already mentioned, in certain circumstances,
especially for critical electronic assets, a
machine can remain out of date (kernel,
modules, etc.) and it can be justified, considered
acceptable and secure based on the threats and
vulnerabilities assessed.
It’s important to remember that this concept is
applicable to all organizations. Updating a
system is not necessarily the option to consider
while at other moment, change is the only
acceptable way to remain secure.
Finally, while often mandatory, monitoring
against threats is a crucial security activity that
all organizations can benefit.
of Standards and Technology, Guide to Industrial Control
Systems (ICS) Security, Special Publication 800-82 P. 5-3.
iv
Katherine Hibbs Pherson, Randolph H Pherson, “PART V:
CASE STUDIES” Critical Thinking For Strategic Intelligence,
2013, 1st
ed., 978-1452226675
P. 240.

More Related Content

What's hot

It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteDamir Delija
 
Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Huntsman Security
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printjames morris
 
Cylance_Protect_Datasheet
Cylance_Protect_DatasheetCylance_Protect_Datasheet
Cylance_Protect_DatasheetTiana Henriks
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment PresentationLionel Medina
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessmentprimeteacher32
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 

What's hot (20)

It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
 
what is security
what is securitywhat is security
what is security
 
Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_print
 
Cylance_Protect_Datasheet
Cylance_Protect_DatasheetCylance_Protect_Datasheet
Cylance_Protect_Datasheet
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Ijetr042329
Ijetr042329Ijetr042329
Ijetr042329
 
Select idps
Select idpsSelect idps
Select idps
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
Ch13 security engineering
Ch13 security engineeringCh13 security engineering
Ch13 security engineering
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 

Viewers also liked

Result Monitoring System using SMS thesis
Result Monitoring System using SMS thesisResult Monitoring System using SMS thesis
Result Monitoring System using SMS thesisCarul Push
 
Student Monitoring Attendance System
Student Monitoring Attendance SystemStudent Monitoring Attendance System
Student Monitoring Attendance Systemyumico23
 
Thesis
ThesisThesis
Thesiscas123
 
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS TechnologyThesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS TechnologyBelLa Bhe
 

Viewers also liked (6)

Result Monitoring System using SMS thesis
Result Monitoring System using SMS thesisResult Monitoring System using SMS thesis
Result Monitoring System using SMS thesis
 
Student Monitoring Attendance System
Student Monitoring Attendance SystemStudent Monitoring Attendance System
Student Monitoring Attendance System
 
Thesis
ThesisThesis
Thesis
 
Attendance monitoring system
Attendance monitoring systemAttendance monitoring system
Attendance monitoring system
 
BSCS | BSIT Thesis Guidelines
BSCS | BSIT Thesis GuidelinesBSCS | BSIT Thesis Guidelines
BSCS | BSIT Thesis Guidelines
 
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS TechnologyThesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
 

Similar to Monitoring your organization against threats - Critical System Control

Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionchristophefeltus
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSIJNSA Journal
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSIJNSA Journal
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inmaribethy2y
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructureAnton Chuvakin
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 

Similar to Monitoring your organization against threats - Critical System Control (20)

Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
I0516064
I0516064I0516064
I0516064
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Kb2417221726
Kb2417221726Kb2417221726
Kb2417221726
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
IDS Research
IDS ResearchIDS Research
IDS Research
 

More from Marc-Andre Heroux

Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Marc-Andre Heroux
 
Frame - MAC Address Threats & Vulnerabilities
Frame - MAC Address Threats & VulnerabilitiesFrame - MAC Address Threats & Vulnerabilities
Frame - MAC Address Threats & VulnerabilitiesMarc-Andre Heroux
 
Modèle de sécurité organisationnelle
Modèle de sécurité organisationnelleModèle de sécurité organisationnelle
Modèle de sécurité organisationnelleMarc-Andre Heroux
 
Méthodologie - adoption d'une norme en 7 étapes
Méthodologie - adoption d'une norme en 7 étapesMéthodologie - adoption d'une norme en 7 étapes
Méthodologie - adoption d'une norme en 7 étapesMarc-Andre Heroux
 
BUSINESS MATURITY LIFE CYCLE
BUSINESS MATURITY LIFE CYCLEBUSINESS MATURITY LIFE CYCLE
BUSINESS MATURITY LIFE CYCLEMarc-Andre Heroux
 
Assurance compliance management system
Assurance compliance management systemAssurance compliance management system
Assurance compliance management systemMarc-Andre Heroux
 

More from Marc-Andre Heroux (9)

Linux encrypted container
Linux encrypted containerLinux encrypted container
Linux encrypted container
 
IT Control Framework
IT Control FrameworkIT Control Framework
IT Control Framework
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0
 
Online Authentication
Online AuthenticationOnline Authentication
Online Authentication
 
Frame - MAC Address Threats & Vulnerabilities
Frame - MAC Address Threats & VulnerabilitiesFrame - MAC Address Threats & Vulnerabilities
Frame - MAC Address Threats & Vulnerabilities
 
Modèle de sécurité organisationnelle
Modèle de sécurité organisationnelleModèle de sécurité organisationnelle
Modèle de sécurité organisationnelle
 
Méthodologie - adoption d'une norme en 7 étapes
Méthodologie - adoption d'une norme en 7 étapesMéthodologie - adoption d'une norme en 7 étapes
Méthodologie - adoption d'une norme en 7 étapes
 
BUSINESS MATURITY LIFE CYCLE
BUSINESS MATURITY LIFE CYCLEBUSINESS MATURITY LIFE CYCLE
BUSINESS MATURITY LIFE CYCLE
 
Assurance compliance management system
Assurance compliance management systemAssurance compliance management system
Assurance compliance management system
 

Recently uploaded

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Monitoring your organization against threats - Critical System Control

  • 1. S e c u r i t y a n d C o m p l i a n c e : M o n i t o r i n g , c o n t r o l l i n g , a n d c h a n g e s P a g e | 1 Monitoring your organization against threats Critical System Control Montreal, April 24, 2014 By Marc-Andre Heroux CGEIT, CISA, CRMA, CRMP, ABCP, CISSP, NSA-IAM, NSA-IEM Compliance & Security Advisor ll organizations are facing various types of threats. Threats can come from inside, outside your organization or from both. This article focus on monitoring informational resources against all types of threats threatening your critical functions supported by electronic assets such as servers, desktops, switches, routers, firewalls, etc. Today, some people think that keeping a system or a state hidden make a system more secure. Probably because of my own experiences and knowledge about Cyber Security, I see things little bit differently from many other experts. Over the last 17 years, I have implemented and conducted security assessments against many types of critical systems, and often connected to the Internet. Critical public systems such as DNS, Web, Mail, VPN using various types of authentication mechanisms such as saslauthd, oauth2, SAML, etc. against Oracle, MySQL, MS-SQL and using many types of technologies such as secure LDAP or SSL can be easily discovered by attackers. Why monitoring for potential threats? Simple: organizations are getting more and more interconnected and thinking that the obscurity can be considered as a security control is similar to me to ignoring the new reality of Interconnected Networks and the risk surrounding the Internet. As a security specialist I share the same approach as the Kerckhoffs's principlei , also formulated by Claude Shannon as the enemy knows the system and widely used by cryptographers as opposed to security by obscurity: “a critical system can be known and be secure”. For a critical system connected to the Internet, I recommend to keep it up-to-date (ex.: latest kernels, modules, etc.), continuously monitor against threats and abnormal activities and correct issues when detected by the implementation or the correction of a physical, operational, administrative or technical controls. I do also recommend to use application controls such as whitelisting and implement an IPS (if data flow are critical, IDS mode is usually preferable). For critical system not connected to the Internet or not connected to a network (no access in, no access out), my recommendations are different and vary in function of many elements. This article explain you what are the basics elements you may have to consider to choose the proper controls. Lock and monitor Most knowledgeable security specialists agree and understand that we “monitor” traffic for critical activities such as bank transactions, Programmable Logic Controller (PLC) and critical computers used by industrial organizations (e.g.: energy) with IDS and that we do not use IPS. It’s the same situation with the use of anti-malware technical controls on very critical isolated systems, it’s often preferable to have a system state unchanged and operationally functional and receive an alert regarding a potential suspicious activity or an alarm when abnormal activity is detected as opposed to block a system execution. Blocking valid activity could potentially generate a negative business impact while the control is A
  • 2. S e c u r i t y a n d C o m p l i a n c e : M o n i t o r i n g , c o n t r o l l i n g , a n d c h a n g e s P a g e | 2 A u t h o r : M a r c - A n d r e H e r o u x Monitoring your organization against threats Critical System Control supposed to protect. This is one of the main reason why some very critical and isolated system are simply not running anti-malware, IPS or specific technical control against threats and rely on strict procedure and acceptable practices. We must remember that subnets must be segregated and if necessary, multi-level DMZ must be implemented and virtual routing and forwarding as well as 802.1Q tunneling must be used carefully. Conducting a risk assessment including a risk analysis and a business impact assessment allow to establish the proper orientation and select the proper controls. Such experts understand when it is preferable to use an IPS (often against Internet threats in TCP segments and never on against frames of internal networks when critical system are involved (e.g.: Ethernet II). This apply to all organizations conducting critical activities such as banks, energy, industrial, etc. Monitoring traffic is crucial and is often mandatory (e.g.: NERCii ). Filtering and blocking malicious traffics is often optional, but I usually suggest IPS to detect and block threats in incoming/outgoing traffics from boundaries of critical perimeters (e.g.: Internet to Intranet, Intranet to critical perimeter gateways), but never in electronic security perimeters (ESP) where blocking valid traffics could lead to various operational disaster scenarios. Real-time monitoring of firewalls and other security sensors is required to rapidly detect and initiate response to cyber incidents.iii Security and Compliance involve by default: exception, justification and compensatory measures. In all organizations, there are situations where it is considered more secured with reason to not apply any changes to a specific system (ex.: a HSM bank system remain usually unchanged, mainframes and Unix systems are other examples, especially in industrial organizations (ex.: in the energy sector, Technical Feasibility Exceptions (TFE) can justify the exemption of running a protective control such as an anti-malware or applying any update like system or firmware update, etc.). Security paradigm Despite it is usually considered unsecured to keep a system unchanged, as previously explained, it is sometimes the only way to keep it to an acceptable security posture considering the potential impacts of loss, especially when systems are isolated and very critical. In those situations, a justification (e.g.: ticket, derogation, statement of applicability, etc.) must be provided in order to document the reasons and duration of the exception in time. An organization can be compliant and secure while system are unchanged during a long period of time (e.g.: years) and it is important to understand this reality in large corporations conducting critical activities. Not all systems can remain secured while unchanged, usually systems isolated in restricted networks or not interconnected to a computer network are valid examples. This is where compensatory measures are especially important (e.g.: the Stuxnet virusiv was able to infect critical systems, particularly IDSIDS sensor
  • 3. S e c u r i t y a n d C o m p l i a n c e : M o n i t o r i n g , c o n t r o l l i n g , a n d c h a n g e s P a g e | 3 A u t h o r : M a r c - A n d r e H e r o u x Monitoring your organization against threats Critical System Control because of a lack of procedures surrounding the acceptable uses of USB keys). The uses of USB keys against critical systems must be strictly controlled and ideally avoided. The use of an infected USB key could be very risky lead to disclosure and modification of information and in some cases, to system dis-functionality and disruption. It appears that good practices and appropriate procedures in the management of critical system permits to many organizations to remain safe against technical threats while monitoring abnormal activities. For critical system, we often suggest to apply controls to maintain a system unchanged and monitor it to abnormal behaviours or modifications. As opposed to general security practices suggesting regular systems updates, critical systems (ex: industrial, bank) must remain unchanged during a long period and be monitored for abnormal activities or behaviours. This approach: “controlling and monitoring” can be very effective. Technically, the most challenging aspects while controlling and monitoring activities, are selecting the proper i David Salomon, “Kerckhoffs's principle” Data Privacy and Security: Encryption and Information Hiding , 2003, ISBN 0-387-00311-8, P. 15,435. ii North American Electric Reliability Corporation (NERC) CIP-005-4 R3, Monitoring Electronic Access iii Keith Stouffer, Joe Falco, Karen Scarfone, National Institute controls (e.g.: McAfee Application Control, Tripwire, etc.), IDS location (e.g.: boundaries of perimeters) where the sensors send capture logs, the sensors emplacement and the type of traffic to monitor (e.g.: UDP, TCP, Ethernet II). Remember, monitoring local traffic is necessary to be able to detect layer 2 threats (e.g.: MAC Address attack). As already mentioned, in certain circumstances, especially for critical electronic assets, a machine can remain out of date (kernel, modules, etc.) and it can be justified, considered acceptable and secure based on the threats and vulnerabilities assessed. It’s important to remember that this concept is applicable to all organizations. Updating a system is not necessarily the option to consider while at other moment, change is the only acceptable way to remain secure. Finally, while often mandatory, monitoring against threats is a crucial security activity that all organizations can benefit. of Standards and Technology, Guide to Industrial Control Systems (ICS) Security, Special Publication 800-82 P. 5-3. iv Katherine Hibbs Pherson, Randolph H Pherson, “PART V: CASE STUDIES” Critical Thinking For Strategic Intelligence, 2013, 1st ed., 978-1452226675 P. 240.