cisa cybersecurity briefing

27
CISA | CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY 2021 FTA Joint SSO and RTA Virtual Workshop CISA Cybersecurity Briefing Benjamin Gilbert Cybersecurity Advisor, Region III Cybersecurity and Infrastructure Security Agency October 2021 1

Upload: others

Post on 18-May-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CISA Cybersecurity Briefing

C I S A | C Y B E R S E C U R I T Y A N D I N F R A S T R U C T U R E S E C U R I T Y A G E N C Y

2021 FTA Joint SSO and RTA Virtual Workshop

CISA Cybersecurity Briefing

Benjamin Gilbert Cybersecurity Advisor, Region IIICybersecurity and Infrastructure Security Agency

October 2021

1

Page 2: CISA Cybersecurity Briefing

2

Page 3: CISA Cybersecurity Briefing

3

Page 4: CISA Cybersecurity Briefing

4

Page 5: CISA Cybersecurity Briefing

CISA Offers No-Cost Cybersecurity Services• Response Assistance

• Remote / On-Site Response and Assistance

• Incident Coordination• Threat intelligence and information

sharing• Malware Analysis

• Cybersecurity Advisors• Incident response coordination• Cyber assessments• Workshops • Working group collaboration• Advisory assistance• Public Private Partnership

Development

• Preparedness Activities• Cybersecurity Assessments• Cybersecurity Training and

Awareness• Cyber Exercises and “Playbooks”• Information / Threat Indicator

Sharing• National Cyber Awareness System• Vulnerability Notes Database• Information Products and

Recommended Practices

Contact CISA to report a cyber incident Call 1-888-282-0870 | email [email protected] | visit https://www.cisa.gov

5

Page 6: CISA Cybersecurity Briefing

• February 2013, in collaboration with DHS NPPD, developed the Framework in concert with public and private sector stakeholders

• Released version 1.1 April 2018: https://www.nist.gov/cyberframework

• Conducts cybersecurity outreach to critical infrastructure and other stakeholders

• Promotes the Framework, CISA cybersecurity resources and best practices

CYBERSECURITY FRAMEWORK PARTNERSHIP

6

Page 7: CISA Cybersecurity Briefing

NIST Cybersecurity Framework• The Cybersecurity

Framework • Establishes a common

perspective and vernacular,• Provides risk-based guidelines,• Is collaboration-oriented, and• Is internationally recognized

7

Page 8: CISA Cybersecurity Briefing

8

• Benefits:

• Immediately available for download upon request

• Understanding of operational technology and information technology network security practices

• Ability to drill down on specific areas and issues

• Includes self-evaluations against NIST CSF v1.1

• Also includes self-evaluations with CMMC, RRA, and other maturity models

Cybersecurity Evaluation Tool•Purpose: Assesses control system and information technology network security practices against industry standards.

•Facilitated: Self-Administered, undertaken independently

Page 9: CISA Cybersecurity Briefing

9

• Cyber Resilience Review (Strategic)

• External Dependencies Management (Strategic)

• Cyber Infrastructure Survey (Strategic)

• Cybersecurity Evaluations Tool (standards based)

• Validated Architecture Design Review (Tactical)

• Cyber Hygiene (Technical)

• Phishing Campaign Assessment

• Vulnerability Scanning

• Web Application Scanning

• Remote Penetration Test

• Risk and Vulnerability Assessment (Technical)

Range of Cybersecurity Assessments

TECHNICAL(Network-Administrator

Level)

STRATEGIC(C-Suite Level)

Page 10: CISA Cybersecurity Briefing

CYBERSECURITY AWARENESS MONTH 2021

10

Page 11: CISA Cybersecurity Briefing

C I S A | C Y B E R S E C U R I T Y A N D I N F R A S T R U C T U R E S E C U R I T Y A G E N C Y

CISA Contact In format ionBenjamin Gilbert, CISSP, CRISC, CEHIntegrated Operations Division – Regional Operations

[email protected]@cisa.dhs.gov

CISA URL https://www.cisa.gov

To Report a Cyber Incident to CISACall 1-888-282-0870Email [email protected] https://www.cisa.gov

• Preparedness Activities• Cybersecurity Assessments• Cybersecurity Training and Awareness• Cyber Exercises and “Playbooks”• Information / Threat Indicator Sharing• National Cyber Awareness System• Vulnerability Notes Database• Information Products and

Recommended Practices

• Response Assistance• 24/7 Response assistance and malware analysis• Incident Coordination• Threat intelligence and information sharing

• Cybersecurity Advisors – Regionally deployed advisors

• Incident response coordination• Public Private Partnership Development• Advisory assistance and cybersecurity assessments

No-Cost CISA Cybersecur i ty Serv ices

11

Page 12: CISA Cybersecurity Briefing

12

Page 13: CISA Cybersecurity Briefing

D E P A R T M E N T O F H O M E L A N D S E C U R I T Y

(U) Warning: This document is UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO). It contains information that may be exempt from public release under the Freedom of Information Act (5 U.S.C. 552). It is to be controlled, stored, handled, transmitted, distributed, and disposed of in accordance with DHS and FBI policy relating to FOUO information and is not to be released to the public, the media, non-US Citizens or other personnel who do not have a valid need to know without prior approval of an authorized DHS or FBI official. Federal, State and local homeland security officials may share this document with authorized critical infrastructure and key resource personnel and private sector security officials without further approval from DHS and FBI.

(U) This product contains US person information that has been deemed necessary for the intended recipient to understand, assess, or act on the information provided. It has been highlighted in this document with the label USPER and should be handled in accordance with the recipient's intelligence oversight and/or information handling procedures.

TLP:AMBER - Limited disclosure, restricted to participants’ organizations. Sources may use TLP:AMBER when information requires support to be effectively acted upon, yet carries risks to privacy, reputation, or operations if shared outside of the organizations involved. Recipients may only share TLP:AMBER information with members of their own organization, and with clients or customers who need to know the information to protect themselves or prevent further harm. Sources are at liberty to specify additional intended limits of the sharing: these must be adhered to.

DHS THREAT INTELLIGENCE BRIEF -TRANSPORTATION SYSTEMS SECTOR

UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Anthony Militano Branch Chief – CISA Intelligence, Analysis BranchCybersecurity and Infrastructure Security Agency

Page 14: CISA Cybersecurity Briefing

AgendaUNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Defining the Threat Environment

Threat Overview – Transportation Systems Sector

Cyber Threat Actor Capabilities and Attributes

Rail – Mass Transit

Page 15: CISA Cybersecurity Briefing

Defining the Threat EnvironmentUNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Threat = Capability + Intent + Opportunity

Threat Mitigation = Threat - Opportunity

Page 16: CISA Cybersecurity Briefing

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Threat Overview – Transportation Systems Sector

UNCLASSIFIED//FOR OFFICIAL USE ONLY

The Transportation Systems Sector faces a multitude of cyber threats at the hands of criminals, hackers, insiders, and nation-state actors.

Disruptive attacks, such as cyber physical manipulation, GPS spoofing and jamming, represent low-frequency—but potentially catastrophic threats—to the transportation industry.

Interdependencies between layers of air, rail, and maritime transportation systems provide actors with opportunities to perform operations leveraging a variety of attack surfaces.

Page 17: CISA Cybersecurity Briefing

Cyber Threat Actor Capabilities and Attributes

Page 18: CISA Cybersecurity Briefing

Rail - Cyber LandscapeUNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Rail cyber-reliance includes;§ Positive Train Control

(PTC)§ Switch Positioning:§ Data and Voice

Communication System§ Wayside Signal Systems§ Distributed Power§ End of Train Devices§ Highway Grade Crossing

Systems

Page 19: CISA Cybersecurity Briefing

Mass Transit - 2020-2021 Cyber Threat Activity of NoteUNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Cyber Espionage & Cyberattack Threats:

Chinese government cyber actors compromise New York MTA

The most frequent TTP known to compromise rail victim networks since January 2020 was ransomware.

Cybercriminals mostly targeted networks containing; § Business data§ Personally Identified Information (PII)§ Credit card information from passenger ground service systems

Domestic or Canadian MTPR: § 7 Ransomware attacks§ 3 Non-ransomware, malicious cyber activity (beaconing to foreign

IP, DDoS, data breach, etc.

Foreign MTPR: 6 Ransomware attacks or other malicious cyber activity on entities

Most common Ransomware used: Nefilim, Netwalker, REvil, Ransom X

Cyberattack on Iranian Rail System

Page 20: CISA Cybersecurity Briefing

Please direct any questions or concerns regarding this brief to CISA Intelligence.

[email protected]

Page 21: CISA Cybersecurity Briefing

CISA InsightsSeptember 27, 2021

C I S A | CY B E RS E CUR I T Y A ND I NF RA S T RUC T URE S E CUR I T Y A G E NCY

TLP: WHITE

CYBER RISK SUMMARY: TRANSPORTATION SYSTEMS SECTOR

OCTOBER 2020 – JULY 2021

1

Christopher HildInformation Security Specialist, Vulnerability ManagementCybersecurity and Infrastructure Security Agency (CISA)

Page 22: CISA Cybersecurity Briefing

Transportation Systems: Vulnerability Findings

54.5% of scanned TS entities exposed risky services on internet-accessiblehosts that, absent compensating controls, can provide threat actors with initialaccess and avenues for command and control (C2) and data exfiltration.

Exposed Risky Services

54.5% of TS entities that participated in Remote Penetration Testing (RPT) had email filtering controls that were bypassed by spearphishing emails, suggesting threat actors may have similar success when launching phishing attacks.

Spearphishing Weaknesses

48.5% of scanned TS entities ran unsupported Windows operating systems (OSs) that no longer receive routine security updates on at least one internet-accessible host at the end of Jul 2021, increasing exposure to vulnerabilities that can enable compromise.

Unsupported Operating

Systems (OSs)

CISA InsightsSeptember 27, 2021 22TLP: WHITE

CISA recommends that all Transportation Systems (TS) entities review the following findings—derived from an analysis of 33 TS entities enrolled in CISA's free Cyber Hygiene (CyHy) Vulnerability Scanning (VS) service and 11 TS entities that received CISA Assessment services from October to July 2021—and take appropriate action to reduce vulnerability, risk of compromise, and maintain resilient cybersecurity practices.

Page 23: CISA Cybersecurity Briefing

Recommendations

CISA InsightsSeptember 27, 2021 23TLP: WHITE

Improve phishing defenses

§ Provide training to all levels of staff on how to identify and report phishing emails.

§ Implement spam-filtering and border protections such as DMARC.

§ Leverage outbound web-browsing protections to mitigate consequences if a phishing email defeatsboarder protections and trained staff.

Improve patch management

§ Prioritize remediation of vulnerabilities using a risk-based approach that considers likelihood of attack, ease of exploitation, and the magnitude of probable impact.

§ Modify patch management strategies to prioritizepatching vulnerabilities with known exploits.

Secure potentially risky service

§ Evaluate the business need for exposing risky services on internet-accessible hosts.

§ Disable or block all unnecessary services.

§ If certain services are required, then operate the services with proper configurations and securityfeatures enabled, such as multifactor authentication (MFA).

Defend against ransomware

§ Practice network segmentation and keep offline, encrypted backups of data.

§ Maintain cyber incident response plans.

§ Refrain from paying a ransom and report incidents to CISA and to your localFBI field office.

Page 24: CISA Cybersecurity Briefing

CISA InsightsSeptember 27, 2021TLP: WHITE

From Oct 2020 to Jul 2021, newly enrolled TS entities reduced active vulnerabilities by an average of 22.4% within the first three months of conducting vulnerability scanning.

CISA offers free cybersecurity services to TS entities:§ Vulnerability Scanning: Persistent scanning of internet-accessible systems for

vulnerabilities, configuration errors, and suboptimal security practices.§ Web Application Scanning: Assesses the “health” of publicly accessible web applications

by checking for known vulnerabilities and weak configurations.§ CISA Assessments: Agency cybersecurity assessments (e.g., RPT) provide actionable

and risk-informed recommendations.

Email [email protected] for more information and to sign up.

Sign up for Cyber Hygiene Services

4

Page 25: CISA Cybersecurity Briefing

CISA InsightsSeptember 28, 2021 5

Cybersecurity Division | Vulnerability Management

Cyber Risk Summary Questions and Feedback: [email protected]

Cyber Hygiene Services: https://www.cisa.gov/cyber-hygiene-services [email protected]

Page 26: CISA Cybersecurity Briefing

CISA | DEFEND TODAY, SECURE TOMORROW

CYBER HYGIENE: VULNERABILITY SCANNING (CyHy VS)The Cybersecurity and Infrastructure Security Agency (CISA) Cyber Assessments team supports Federal, State, Local,Tribal and Territorial Governments and Critical Infrastructure partners by providing proactive testing and assessmentservices.

CISA’s Cyber Hygiene Vulnerability Scanning (CyHy VS) is “internet scanning-as-a-service.” This service continuously assesses the “health” of your internet-accessible assets by checking for known vulnerabilities and weak configurations, and recommends ways to enhance security through modern web and email standards.

OBJECTIVES• Maintain enterprise awareness of your internet-accessible systems• Provide insight into how systems and infrastructure appear to potential attackers• Drive proactive mitigation of vulnerabilities and reduce risk

SCANNING PHASES AND STAGESPHASES• Target Discovery: Identify all active internet-accessible assets (networks, systems, and hosts) to be scanned• Vulnerability Scanning: Initiate non-intrusive checks to identify potential vulnerabilities and configuration

weaknesses

STAGESPre-Planning

• Request Service• Receive Cyber Hygiene brief• Provide target list (scope)

• Sign and return documents Planning

• Confirm scanning schedule• Pre-scan notification Execution (Tailored*)

• Initial scan of submitted scope• Rescan scope based on detected vulnerability severity:Þ 12 hours for “critical”Þ 24 hours for “high”Þ 4 days for “medium”Þ 6 days for “low”Þ 7 days for “no vulnerabilities”

Post-Execution• Ongoing weekly summary report• Vulnerability mitigation recommendations• Detailed findings in consumable format

cisa.gov [email protected] Linkedin.com/company/cisagov @CISAgov | @cyber | @uscert_gov Facebook.com/CISA @cisagov

CISA CYBER ASSESSMENTS

Page 27: CISA Cybersecurity Briefing

CISA | DEFEND TODAY, SECURE TOMORROW 2

CISACyber Assessments

ABOUTOur TeamThis CISA team is a group of highly trained information security experts. Our mission is to measurably reduce cybersecurity risks to our Nation.

CISA leads the national effort to protect and enhance the resilience of the nation’s physical and cyber infrastructure.

Our ServicesCISA Cyber Assessment services provide:

• A proactive, risk-based approach to analyzing stakeholder systems• Expertise in identification of vulnerabilities, risk evaluation and prioritized mitigation guidance• Comprehensive services that empower stakeholders to increase speed and effectiveness of their cyber response

capabilities

Additional InformationCISA’s security services are available at no cost. Stakeholders include Federal, State, Local, Tribal and Territorial governments, as well as Critical Infrastructure private sector companies. CISA does not share attributable information without written and agreed consent from the stakeholder. CISA uses anonymized data to develop non-attributed reports for trending and analysis purposes.

GET STARTEDCapabilities and service delivery timelines are available upon request. Service availability is limited. Contact us at [email protected] to get started. Service delivery queues are prioritized on a continuous basis to ensure no stakeholder or sector receives a disproportionate amount of resources and that the data collected is a diverse representation of the nation.

MISSION AND VISIONMission: Providing cybersecurity assessments to facilitate the identification of risk for the purpose of protecting theNation’s cyber infrastructure.

Vision: To be the preeminent government leader providing comprehensive, innovative, and dynamic cybersecurity assessments for the purpose of facilitating and protecting the federal, state, private sector and critical infrastructure networks of the United States, reducing attack surfaces, eliminating threats and fostering partnerships across the government landscape.

For more information or to seek additional help, contact us at [email protected].

cisa.gov [email protected] Linkedin.com/company/cisagov @CISAgov | @cyber | @uscert_gov Facebook.com/CISA @cisagov