Cybersecurity Monitoring

Transcription

Cybersecurity Monitoring
Cybersecurity Monitoring
Gib Sorebo
AGENDA
− Current State of Control System
Cybersecurity Monitoring
− Reasons for Concern
− Options for Greater Visibility
− Potential Ecosystem
− Responding to Events
2
Why is Network Monitoring Needed?

Today’s computing environment is extremely decentralized
− Creates many, many entry points into your systems
− Giving hackers tremendous advantages

You can’t prevent everything
− End user errors, time to patch systems, third parties, the internet, etc.

Detection is the key step between prevention and corrective action
−
−
−
−
Adds context to tools (IDS, Firewalls, Proxy, etc)
Use cases alert on things tools will not see
Gives metrics and trends
Supports corrective and preventative actions
The Undiscovered Breach
229
“Median number of days attackers were present on a victim’s network before
being discovered” in 2013
Source: 2014 Mandiant Threat Report
4
Network Monitoring
Reasons for Concern: The Kill Chain
5
Current State for Monitoring Operations Technology (OT)
HMI = Human Machine Interface WAN = Wide Area Network SIEM = Security Information and Event Management SOC = Security
Operations Center IDS = Intrusion Detection System
6
Network Monitoring
Reasons for Concern: Supply Chain
FBI: Counterfeit Cisco
routers risk “IT subversion”
ZDNet, May 12, 2008
Soviet Trans-Siberian
Pipeline Sabotage (1982)
Dell on Wednesday said that some
replacement motherboards for
PowerEdge servers may have contained
the W32.Spybot worm in flash storage.
PC Magazine, July 22, 2010
Stuxnet (2010)
7
Options for Greater Visibility on the Operations Side
8
The Enterprise Needs Better Coverage Too
• Conceptually, resources should
be segmented by function so
that monitoring and traffic
restrictions can be effective
• Practically, organizations need
to prioritize where to focus their
efforts and start by isolating
their DMZ, system
administration functions, users,
and operational technology (OT)
DMZ = Demilitarized Zone
Monitoring—Logistical Architecture
Responding to Breaches

Do you know what normal looks like?
− Control system behavior
− Electro-mechanical behavior (don’t forget to read the gauges and use all
your senses)

Can you operate without computers? If so, for how long?

How will you know when you can trust your computers again?

Are your business processes prioritized and staffed appropriately?
− Outage management/customer service may need more staff without
automation
− What systems need to come back up first?
− What are the dependencies?
− Who gets to decide what’s most important?
11
Staffing Levels
for Security
Operations
Center
Alignment with
Control
Processes
False Positives
12
Other
Considerations
Coverage of
All Kill Chain
Stages
No Disruption
to Operations
Questions?
For more information
contact:
Gib Sorebo
Leidos Chief Cybersecurity Technologist
phone: 703-676-0269 | email: sorebog@leidos.com