Hacker Halted 2014 - Control Quotient: Adaptive Strategies For Gracefully Losing Control - [PDF Document] (2024)

Control Quo*ent: Adap*ve Strategies For Gracefully Losing Control

Agenda Context

The Control Quo*ent

Today’s Reality

Making it Personal

Examples

Transcending “Control”

Apply

CONTEXT

Forces of Constant Change

BUSINESS COMPLEXITY

= RISING COSTS

Evolving Threats

Evolving Technologies

Evolving Compliance

Evolving Economics

Evolving Business Needs

The IT Drunken Bender

The Control Con*nuum

Dictator Surrender

Control

Sphere of Control

Control

Influence

Sphere of Influence vs. Control

THE CONTROL QUOTIENT

The Control Quo*ent Defini*on •  QuoGent: (from hOp://www.merriam-­‐webster.com/dic*onary/quo*ent )

–  the number resul*ng from the division of one number by another

–  the numerical ra*o usually mul*plied by 100 between a test score and a standard value

–  quota, share –  the magnitude of a specified characterisGc or quality

•  Control QuoGent: opGmizaGon of a security control based on the maximum efficacy within sphere of control (or influence or trust) of the underlying infrastructure*

•  *unless there is an independent variable…

History •  RSA Conference US 2009 P2P with @joshcorman – An endpoint has a comprehensive, but suspect, view

– The network has a trustworthy, but incomplete, view

In Theory There Is An Op*mal Place to Deploy a Control…

But Degrees Of Separa/on Happen….

Avoiding the Proverbial…

TODAY’S REALITY

Today’s Reality

•  Administra*ve control of en*re system is lost

•  Increased aOack surface •  Abstrac*on has made systems difficult to assess

•  Expecta*on of any*me-­‐anywhere access from any device

Security Management & GRC

IdenGty/EnGty Security

Data Security

Host

Network Infrastructure Security

ApplicaGon Security

CSA Cloud Model The Control Quo*ent and the SPI Stack

Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.

CSA Cloud Model

Security Management & GRC

IdenGty/EnGty Security

Data Security

Host

Network Infrastructure Security

ApplicaGon Security

Virtualiza/on, So:ware Defined Networks, and Public/Hybrid/Community Cloud Forces a Change

in How Security Controls Are Evaluated and Deployed

The Control Quo*ent and the SPI Stack

Controls Gained!!! •  Virtualiza*on and Cloud

– Asset, Configura*on and Change Management –  Snapshot –  Rollback –  Pause

•  VDI – Asset, Configura*on and Change Management

•  Mobility –  Encryp*on (with containers)

•  Sogware-­‐As-­‐A-­‐Service –  Logging!

MAKING IT PERSONAL

A Parent’s Most Valuable Asset?

A Parent’s Most Valuable Asset?

Most Valuable Asset?

…Yet Most Parents Allow Their Kids to Leave Their Control

Choosing Child Care?

NaGonal AssociaGon for the EducaGon of Young

Children

EXAMPLES

Virtualiza*on and Cloud Created An En*re New Defini*on of Privilege

Amazon EC2 - IaaS

Salesforce - SaaS

Google AppEngine - PaaS

Stack by Chris Hoff -­‐> CSA

The Control Quo*ent and the SPI Stack

Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue. “Stack” by Chris Hoff -­‐> CSA

Amazon EC2 - IaaS

The lower down the stack the Cloud provider stops, the more security you are tactically responsible for implementing & managing yourself.

Salesforce - SaaS

Google AppEngine - PaaS

Stack by Chris Hoff -­‐> CSA

The Control Quo*ent and the SPI Stack

Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue. “Stack” by Chris Hoff -­‐> CSA

So, Whose Cloud Is It Anyway? Model Private Cloud IaaS

in Hybrid / Community / Public Cloud

PaaS/SaaS

Whose Privilege Users? Customer Provider Provider

Whose Infrastructure? Customer Provider Provider

Whose VM / Instance? Customer Customer Provider

Whose ApplicaGon? Customer Customer Provider

Government Discovery Contact? Customer Provider Provider

hOp://www.flickr.com/photos/markhillary/6342705495 hOp://www.flickr.com/photos/tallentshow/2399373550

More Than Just Technology…

VDI Server

VDI Image Storage

VDI: Centralizing the Desktop?

hOp://www.flickr.com/photos/patrick-­‐allen/4318787860/

Mobile

hOp://www.sodahead.com/fun/eight...blue-­‐screen.../ques*on-­‐2038989/CachedYou/?slide=2&page=4

IoT / Embedded Devices

Service Providers

Old Ways Don’t Work in New World…

Most organiza/ons are trying to deploy

“tradi/onal” security controls in cloud and virtual environments…but were the controls

even effec/ve then?

TRANSCENDING “CONTROL”

A Modern Pantheon of Adversary Classes

Methods “MetaSploit” DoS Phishing Rootkit SQLi Auth ExfiltraGon Malware Physical

Impacts ReputaGonal Personal ConfidenGality Integrity Availability

Target Assets

Credit Card #s Web ProperGes Intellectual Property PII / IdenGty Cyber

Infrastructure Core Business Processes

Mo*va*ons

Financial Industrial Military Ideological PoliGcal PresGge

Actor Classes

States CompeGtors Organized Crime

Script Kiddies Terrorists “HacGvists” Insiders Auditors

Link to Full Adversary ROI Presenta.on Source: Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M? (RSA US 2012) by Josh Corman and David Etue.

HD Moore’s Law and AOacker Power

•  Moore’s Law: Compute power doubles every 18 months

•  HDMoore’s Law: Casual AOacker Strength grows at the rate of MetaSploit

Source: Joshua Corman, hOp://blog.cogni*vedissidents.com/2011/11/01/intro-­‐to-­‐hdmoores-­‐law/

Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.

Countermeasures Situa*onal Awareness Opera*onal Excellence Defensible Infrastructure

Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.

Countermeasures Situa*onal Awareness

Opera*onal Excellence

Defensible Infrastructure

Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.

Countermeasures

Situa*onal Awareness

Opera*onal Excellence

Defensible Infrastructure

Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.

Countermeasures

Situa*onal Awareness

Opera*onal Excellence

Defensible Infrastructure

Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.

PHI

“IP”

Web

PCI

AV

FW

IDS/IPS

WAF

Log Mngt

File Integrity

Disk Encryp*on

Vulnerability Assessment

Mul*-­‐Factor Auth

An*-­‐SPAM

VPN

Web Filtering

DLP

Anomaly Detec*on

Network Forensics

Advanced Malware

NG Firewall

DB Security

Patch Management

SIEM

An*-­‐DDoS

An*-­‐Fraud

Desired Outcomes Leverage Points

Compliance (1..n)

“ROI” Breach / QB sneak

Produc*vity

PHI

PCI

“IP”

Web

Control “Swim Lanes”

Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.

Web

PHI

“IP”

PCI

AV

FW

IDS/IPS

WAF

Log Mngt

File Integrity

Disk Encryp*on

Vulnerability Assessment

Mul*-­‐Factor Auth

An*-­‐SPAM

VPN

Web Filtering

DLP

Anomaly Detec*on

Network Forensics

Advanced Malware

NG Firewall

DB Security

Patch Management

SIEM

An*-­‐DDoS

An*-­‐Fraud

Desired Outcomes Leverage Points

Compliance (1..n)

“ROI” Breach / QB sneak

Procurement

Disrup*on

DevOps

Produc*vity

“Honest Risk”

General Counsel

Control & Influence “Swim Lanes”

Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.

Web

PHI

“IP”

PCI

AV

FW

IDS/IPS

WAF

Log Mngt

File Integrity

Disk Encryp*on

Vulnerability Assessment

Mul*-­‐Factor Auth

An*-­‐SPAM

VPN

Web Filtering

DLP

Anomaly Detec*on

Network Forensics

Advanced Malware

NG Firewall

DB Security

Patch Management

SIEM

An*-­‐DDoS

An*-­‐Fraud

Li*ga*on

Legisla*on

Open Source

Hearts & Minds

Academia

Desired Outcomes Leverage Points

Compliance (1..n)

“ROI” Breach / QB sneak

Procurement

Disrup*on

DevOps

Produc*vity

“Honest Risk”

General Counsel

Under-­‐tapped Researcher Influence

Source: Control Quo.ent: Adap.ve Strategies For Gracefully Losing Control (RSA US 2013) by Josh Corman and David Etue.

Poten*al Independent Variables

• with good key management…

EncrypGon

• well, rootkits for good…

Rootkits

• AnG-­‐DDoS, WAF, Message/Content, IdenGty, etc…

Intermediary Clouds

• with proper integraGon and process support

IdenGty and Access Management

• *if* the provider harnesses the opportunity

Sofware-­‐As-­‐A-­‐Service (SaaS)

Grant me the Serenity to accept the things I cannot change;

Transparency to the things I cannot control;

Relevant controls for the things I can;

And the Wisdom (and influence) to mitigate risk appropriately.

InfoSec Serenity Prayer

Thank You!

•  TwiOer: @djetue •  Resources:

– Adversary ROI: •  [SlideShare] •  [RSA US 2012 Online on YouTube]

– The Cyber Security Playbook: Securing Budget and Forming Allies (with @joshcorman) [BrightTALK]

Hacker Halted 2014 - Control Quotient: Adaptive Strategies For Gracefully Losing Control - [PDF Document] (2024)
Top Articles
Latest Posts
Article information

Author: Carlyn Walter

Last Updated:

Views: 5885

Rating: 5 / 5 (50 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Carlyn Walter

Birthday: 1996-01-03

Address: Suite 452 40815 Denyse Extensions, Sengermouth, OR 42374

Phone: +8501809515404

Job: Manufacturing Technician

Hobby: Table tennis, Archery, Vacation, Metal detecting, Yo-yoing, Crocheting, Creative writing

Introduction: My name is Carlyn Walter, I am a lively, glamorous, healthy, clean, powerful, calm, combative person who loves writing and wants to share my knowledge and understanding with you.