SlideShare a Scribd company logo
A Simple Strategy to Combat Many Security Issues




 Kevin M. Moker, CISSP-ISSMP, CISM, ACP
 Manager, Information Security Risk Management
 Services
What is Risk Management
What is Defense In Depth
Questions & Answer Session
What is Risk?
  Risk is the potential loss from a threat-source
  attacking a vulnerability.
     Example:
        Joe Cracker (threat-source) knows that an online
        banking company has not patched (vulnerability) their
        backend databases. Joe Cracker exploits (loss) the
        system and steals money.
Target Audience
  Senior Management
  Middle Management
  Technology Management
Risk Integration into the SDLC
Risk Assessment
  Identifying risk
Risk Mitigation
  Figuring out how to control the risk
Controls Evaluation
  Control recommendations – what should be
  used to control the risk
Systems Development Life-Cycle (SDLC)
  Normal phases of SDLC
    Initiation
    Build or Acquire
    Implementation
    Operation and Maintenance
    Disposal or End-of-Life
Phase 1 – Initiation
  Phase Characteristics
     The need for an IT system is expressed and the
     purpose and scope of the IT system is
     documented
  Support from Risk Management Activities
     Identified risks are used to support the
     development of the system requirements,
     including security requirements, and a security
     concept of operations (strategy)
Phase 2 – Build or Acquire
  Phase Characteristics
    The IT system is designed, purchased,
    programmed, developed, or otherwise
    constructed
  Support from Risk Management Activities
    The risks identified during this phase can be used
    to support the security analyses of the IT system
    that may lead to architecture and design tradeoffs
    during system development
Phase 3 – Implementation
  Phase Characteristics
    The system security features should be
    configured, enabled, tested, and verified
  Support from Risk Management Activities
    The risk management process supports the assessment of
    the system implementation against its requirements and
    within its modeled operational environment. Decisions
    regarding risks identified must be made prior to system
    operation
Phase 4 – Operation & Maintenance
  Phase Characteristics
    The system performs its functions. Typically the system is
    being modified on an ongoing basis through the addition of
    hardware and software and by changes to organizational
    processes, policies, and procedures
  Support from Risk Management Activities
    Risk management activities are performed for periodic
    system reauthorization or whenever major changes are
    made to an IT system in its operational, production
    environment (e.g., new system interfaces)
Phase 5 – Disposal or End-of-Life
  Phase Characteristics
    This phase may involve the disposition of information,
    hardware, and software. Activities may include moving,
    archiving, discarding, or destroying information and
    sanitizing the hardware and software
  Support from Risk Management Activities
    Risk management activities are performed for system
    components that will be disposed of or replaced to ensure that
    the hardware and software are properly disposed of, that
    residual data is appropriately handled, and that system
    migration is conducted in a secure and systematic manner
Risk is a function of the likelihood of a
given threat-source’s exercising a
particular potential vulnerability, and the
resulting impact of that adverse event on
the organization
Step 1: System Characterization
Step 2: Threat Identification
Step 3: Vulnerability Identification
Step 4: Control Analysis
Step 5: Likelihood Determination
Step 6: Impact Analysis
Step 7: Risk Determination
Step 8: Control Recommendation
Step 9: Results Documentation
System Characterization
   Inputs
      What type of hardware will be used?
      What software will be used?
      What other software will this software “talk” to or interface with?
      What type of data/information will be housed in the software?
      Who will use this software/hardware?
      What’s the mission of this software/hardware?
   Outputs
      Scope: What the software will include and not include
      Function: What business process the software will support
      Data Criticality: The importance of the information
      Data Sensitivity: The sensitivity of the information
Threat Identification
   Inputs
       Is there a history of system attacks?
       Is there an incident database to leverage?
       Is there any data from media sources or government sources?
       Are there known threat areas from known popular software sources? (e.g.,
       Microsoft)
   Outputs
       General threat statements
             E.g., Windows 7 has 120 known threats. Media sources indicate that 4 of the known threats
             have zero-day exploits. Furthermore, internal incident management databases have
             revealed malicious code outbreak.
Vulnerability Identification
   Inputs
       Are there any vulnerabilities discovered from past risk assessments?
       Are there any audit reports that reveal potential vulnerabilities?
       What are the security requirements for the proposed software? (e.g.,
       access control, encryption)
       Did the security test results result in any potential vulnerabilities?
   Outputs
       List of Potential Vulnerabilities (e.g., Weak access control system, 56 bit DES
       encryption used.
Control Analysis
   Inputs
      What are the current controls for the software compared to the internal
      policy controls?
      What are the planned controls for those controls not adequately
      documented in current policy?
   Outputs
      List of current controls
      List of planned controls
Likelihood Determination
   Inputs
      What would be the motivation for a malicious person to attack this
      software?
      What is the capacity of the malicious actor? E.g., time, money, support
      How easy is it to exploit the vulnerability? E.g, ease of exploiting the
      vulnerability
   Outputs
      Likelihood rating
             High Risk
             Moderate Risk
             Low Risk
Impact Anlaysis
   Inputs
      Is there a business continuity plan that discusses the mission impact
      analysis?
      Is there an asset criticality documented in the business continuity plan?
      What is the data criticality?
      What is the data sensitivity?
   Outputs
      Impact Rating
             High Impact
             Moderate Impact
             Low Impact
Risk Determination
   Inputs
      What is the likelihood of the threat exploitation?
      If the threat did exploit the vulnerability, what would be the impact?
      Are the current controls adequate (tested by audit or self-assessment)?
   Outputs
      List of risks and associated risk levels
Control Recommendations
  Recommended controls
     E.g, encryption, strong password controls
Results Documentation
   Risk Assessment Report
Let’s look at a practical approach of how to
            implement this “stuff”
Let’s explore the defense-in-depth strategy
    to understand where risk should be
                addressed.
Defense In Depth Using NIST 800-30
Information Security/Assurance is a tricky
game. It is by no-means perfect and you
can NEVER reduce risk to zero. This
Defense-In-Depth strategy will help an
organization reduce risk a an acceptable
level if management is committed to the
strategy.
Crucial for any Information Security
Program
Necessary in most of today’s markets
Being compliant does not mean
secure
Being secure does not mean
compliant
Information Security Policies
Staff Responsibility Definitions (RACI)
Security Standards and Guidelines
Security Training
Awareness Communications
Policy Enforcement
Security Monitoring Tools (Physical &
Logical)
Vendor Management
Penetration Testing
Vulnerability Scanning
Access Control
Management
Data Center Hardening
Physical Access Control Management
Critical Building Hardening (non-data
center)
Internal Physical Security Officers
Hostile Environment Prevention
Program
External Media Protection Program
Paper-based Protection Program
Network Intrusion Prevention
Program
Virtual Networks
Physical Compartmentalizing
Penetration Testing
Access Control Management
Patch Management
Program
Access Control
Management
Internal Scanning
Program
Encryption
Code Review Program
Information Security Readiness
Review
Penetration Testing Program
Vulnerability Testing Program
Data
Classification
User Access
Encryption
This is not a perfect process. Information
Security mixes science and art. Risk
management and defense in depth is part
science and part art. The goal is to try to
reduce the impacts and likelihood of certain
threats. Things WILL happen, but this
program will make the best effort to minimize
threats and impacts.
What did you get from this presentation?
Do you think that this information is
useful?
Do you think you could apply this to your
life and not just systems?

More Related Content

PPTX
Roadmap to security operations excellence
PDF
Threat Hunting
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PPTX
Cyber Threat Hunting Workshop
PPTX
McAfee SIEM solution
PDF
Cyber Threat hunting workshop
PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
PPSX
Next-Gen security operation center
Roadmap to security operations excellence
Threat Hunting
Effective Threat Hunting with Tactical Threat Intelligence
Cyber Threat Hunting Workshop
McAfee SIEM solution
Cyber Threat hunting workshop
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Next-Gen security operation center

What's hot (20)

PPTX
Beginner's Guide to SIEM
PDF
Threat Hunting Report
PPTX
Threat hunting - Every day is hunting season
PDF
MITRE ATT&CK Updates: ICS
PDF
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
PPTX
Kheirkhabarov24052017_phdays7
PDF
Threat Hunting with Splunk Hands-on
PPTX
Cyber threat intelligence: maturity and metrics
PPTX
Splunk Phantom SOAR Roundtable
PPTX
Threat hunting for Beginners
PPTX
SIEM - Activating Defense through Response by Ankur Vats
PDF
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
PDF
Introduction to QRadar
PPTX
Security Operations Center (SOC) Essentials for the SME
PPTX
ATT&CKing with Threat Intelligence
PDF
PaloAlto Enterprise Security Solution
PDF
MITRE ATT&CK Framework
PDF
Building Security Operation Center
PDF
Threat Modeling Everything
PDF
Endpoint Detection & Response - FireEye
Beginner's Guide to SIEM
Threat Hunting Report
Threat hunting - Every day is hunting season
MITRE ATT&CK Updates: ICS
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
Kheirkhabarov24052017_phdays7
Threat Hunting with Splunk Hands-on
Cyber threat intelligence: maturity and metrics
Splunk Phantom SOAR Roundtable
Threat hunting for Beginners
SIEM - Activating Defense through Response by Ankur Vats
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Introduction to QRadar
Security Operations Center (SOC) Essentials for the SME
ATT&CKing with Threat Intelligence
PaloAlto Enterprise Security Solution
MITRE ATT&CK Framework
Building Security Operation Center
Threat Modeling Everything
Endpoint Detection & Response - FireEye
Ad

Viewers also liked (20)

PPTX
Network security - Defense in Depth
PDF
Defense in Depth – Your Security Castle
PDF
Defence in Depth Architectural Decisions
PDF
Enterprise Security Architecture
PPTX
INFORMATION SECURITY
PDF
RSA 2010 Francis De Souza
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
DOCX
Updated Use Case Narratives
DOCX
Acitivity diagram
PDF
Information Security Committee Presentation Sample
PPTX
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
PPTX
NIST IT Standards for Local Governments 2010
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
PDF
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
PPTX
OSI Layer Security
PDF
EAS-SEC: Framework for securing business applications
PPTX
Securing the Helix Platform at Citrix
PDF
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
Network security - Defense in Depth
Defense in Depth – Your Security Castle
Defence in Depth Architectural Decisions
Enterprise Security Architecture
INFORMATION SECURITY
RSA 2010 Francis De Souza
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Updated Use Case Narratives
Acitivity diagram
Information Security Committee Presentation Sample
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
NIST IT Standards for Local Governments 2010
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
OSI Layer Security
EAS-SEC: Framework for securing business applications
Securing the Helix Platform at Citrix
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
Ad

Similar to Defense In Depth Using NIST 800-30 (20)

PPT
Cs461 06.risk analysis (1)
PPT
Risk Management: A Holistic Organizational Approach
PPT
Risk Assessment And Management
PPTX
Cyber Security # Lec 3
PPT
1. security management practices
PDF
Microsoft InfoSec for cloud and mobile
PPTX
MIS: Information Security Management
PDF
Risk Assessment: Approach to enhance Network Security
PPTX
Understanding the security_organization
PPTX
PPT
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
PPT
Software security engineering
PPT
Software Security Engineering
DOCX
case studies on risk management in IT enabled organisation(vadodara)
PDF
Information Security Planning and Risk Analysis
PPTX
IT Security Bachelor in information technology.pptx
PPTX
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
PPTX
Physical Security Assessment
PDF
Outsourcing
PDF
Internal Controls Over Information Systems
Cs461 06.risk analysis (1)
Risk Management: A Holistic Organizational Approach
Risk Assessment And Management
Cyber Security # Lec 3
1. security management practices
Microsoft InfoSec for cloud and mobile
MIS: Information Security Management
Risk Assessment: Approach to enhance Network Security
Understanding the security_organization
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Software security engineering
Software Security Engineering
case studies on risk management in IT enabled organisation(vadodara)
Information Security Planning and Risk Analysis
IT Security Bachelor in information technology.pptx
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Physical Security Assessment
Outsourcing
Internal Controls Over Information Systems

Defense In Depth Using NIST 800-30

  • 1. A Simple Strategy to Combat Many Security Issues Kevin M. Moker, CISSP-ISSMP, CISM, ACP Manager, Information Security Risk Management Services
  • 2. What is Risk Management What is Defense In Depth Questions & Answer Session
  • 3. What is Risk? Risk is the potential loss from a threat-source attacking a vulnerability. Example: Joe Cracker (threat-source) knows that an online banking company has not patched (vulnerability) their backend databases. Joe Cracker exploits (loss) the system and steals money.
  • 4. Target Audience Senior Management Middle Management Technology Management
  • 5. Risk Integration into the SDLC Risk Assessment Identifying risk Risk Mitigation Figuring out how to control the risk Controls Evaluation Control recommendations – what should be used to control the risk
  • 6. Systems Development Life-Cycle (SDLC) Normal phases of SDLC Initiation Build or Acquire Implementation Operation and Maintenance Disposal or End-of-Life
  • 7. Phase 1 – Initiation Phase Characteristics The need for an IT system is expressed and the purpose and scope of the IT system is documented Support from Risk Management Activities Identified risks are used to support the development of the system requirements, including security requirements, and a security concept of operations (strategy)
  • 8. Phase 2 – Build or Acquire Phase Characteristics The IT system is designed, purchased, programmed, developed, or otherwise constructed Support from Risk Management Activities The risks identified during this phase can be used to support the security analyses of the IT system that may lead to architecture and design tradeoffs during system development
  • 9. Phase 3 – Implementation Phase Characteristics The system security features should be configured, enabled, tested, and verified Support from Risk Management Activities The risk management process supports the assessment of the system implementation against its requirements and within its modeled operational environment. Decisions regarding risks identified must be made prior to system operation
  • 10. Phase 4 – Operation & Maintenance Phase Characteristics The system performs its functions. Typically the system is being modified on an ongoing basis through the addition of hardware and software and by changes to organizational processes, policies, and procedures Support from Risk Management Activities Risk management activities are performed for periodic system reauthorization or whenever major changes are made to an IT system in its operational, production environment (e.g., new system interfaces)
  • 11. Phase 5 – Disposal or End-of-Life Phase Characteristics This phase may involve the disposition of information, hardware, and software. Activities may include moving, archiving, discarding, or destroying information and sanitizing the hardware and software Support from Risk Management Activities Risk management activities are performed for system components that will be disposed of or replaced to ensure that the hardware and software are properly disposed of, that residual data is appropriately handled, and that system migration is conducted in a secure and systematic manner
  • 12. Risk is a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization
  • 13. Step 1: System Characterization Step 2: Threat Identification Step 3: Vulnerability Identification Step 4: Control Analysis Step 5: Likelihood Determination Step 6: Impact Analysis Step 7: Risk Determination Step 8: Control Recommendation Step 9: Results Documentation
  • 14. System Characterization Inputs What type of hardware will be used? What software will be used? What other software will this software “talk” to or interface with? What type of data/information will be housed in the software? Who will use this software/hardware? What’s the mission of this software/hardware? Outputs Scope: What the software will include and not include Function: What business process the software will support Data Criticality: The importance of the information Data Sensitivity: The sensitivity of the information
  • 15. Threat Identification Inputs Is there a history of system attacks? Is there an incident database to leverage? Is there any data from media sources or government sources? Are there known threat areas from known popular software sources? (e.g., Microsoft) Outputs General threat statements E.g., Windows 7 has 120 known threats. Media sources indicate that 4 of the known threats have zero-day exploits. Furthermore, internal incident management databases have revealed malicious code outbreak.
  • 16. Vulnerability Identification Inputs Are there any vulnerabilities discovered from past risk assessments? Are there any audit reports that reveal potential vulnerabilities? What are the security requirements for the proposed software? (e.g., access control, encryption) Did the security test results result in any potential vulnerabilities? Outputs List of Potential Vulnerabilities (e.g., Weak access control system, 56 bit DES encryption used.
  • 17. Control Analysis Inputs What are the current controls for the software compared to the internal policy controls? What are the planned controls for those controls not adequately documented in current policy? Outputs List of current controls List of planned controls
  • 18. Likelihood Determination Inputs What would be the motivation for a malicious person to attack this software? What is the capacity of the malicious actor? E.g., time, money, support How easy is it to exploit the vulnerability? E.g, ease of exploiting the vulnerability Outputs Likelihood rating High Risk Moderate Risk Low Risk
  • 19. Impact Anlaysis Inputs Is there a business continuity plan that discusses the mission impact analysis? Is there an asset criticality documented in the business continuity plan? What is the data criticality? What is the data sensitivity? Outputs Impact Rating High Impact Moderate Impact Low Impact
  • 20. Risk Determination Inputs What is the likelihood of the threat exploitation? If the threat did exploit the vulnerability, what would be the impact? Are the current controls adequate (tested by audit or self-assessment)? Outputs List of risks and associated risk levels
  • 21. Control Recommendations Recommended controls E.g, encryption, strong password controls
  • 22. Results Documentation Risk Assessment Report
  • 23. Let’s look at a practical approach of how to implement this “stuff”
  • 24. Let’s explore the defense-in-depth strategy to understand where risk should be addressed.
  • 26. Information Security/Assurance is a tricky game. It is by no-means perfect and you can NEVER reduce risk to zero. This Defense-In-Depth strategy will help an organization reduce risk a an acceptable level if management is committed to the strategy.
  • 27. Crucial for any Information Security Program Necessary in most of today’s markets Being compliant does not mean secure Being secure does not mean compliant
  • 28. Information Security Policies Staff Responsibility Definitions (RACI) Security Standards and Guidelines Security Training Awareness Communications Policy Enforcement Security Monitoring Tools (Physical & Logical)
  • 29. Vendor Management Penetration Testing Vulnerability Scanning Access Control Management
  • 30. Data Center Hardening Physical Access Control Management Critical Building Hardening (non-data center) Internal Physical Security Officers Hostile Environment Prevention Program External Media Protection Program Paper-based Protection Program
  • 31. Network Intrusion Prevention Program Virtual Networks Physical Compartmentalizing Penetration Testing Access Control Management
  • 33. Code Review Program Information Security Readiness Review Penetration Testing Program Vulnerability Testing Program
  • 35. This is not a perfect process. Information Security mixes science and art. Risk management and defense in depth is part science and part art. The goal is to try to reduce the impacts and likelihood of certain threats. Things WILL happen, but this program will make the best effort to minimize threats and impacts.
  • 36. What did you get from this presentation? Do you think that this information is useful? Do you think you could apply this to your life and not just systems?