internal risk management

32
Internal Risk Management a.k.a. the Insider Threat MN Government IT Symposium Wed. May 13, 2009 Session 32 Barry Caplin Chief Information Security Officer MN Department of Human Services

Upload: barry-caplin

Post on 15-Jan-2015

5.528 views

Category:

Business


2 download

DESCRIPTION

The media has given a great deal of attention to the “insider threat”, the issue of someone within an organization harming or stealing data or assets. How does this happen and why? Shouldn’t we be more concerned with external threats like hackers and cyber-thieves? Learning Nuggets · Insider threat components and issues · Current research · Mitigation and good practices

TRANSCRIPT

Page 1: Internal Risk Management

Internal Risk Managementa.k.a.

the Insider Threat

MN Government IT Symposium

Wed. May 13, 2009

Session 32

Barry Caplin

Chief Information Security Officer

MN Department of Human Services

Page 2: Internal Risk Management

In The News

Page 3: Internal Risk Management
Page 4: Internal Risk Management
Page 5: Internal Risk Management
Page 6: Internal Risk Management

Agenda

• What is it?

• How big an issue?

• What do we do?

Page 7: Internal Risk Management

What is Internal Risk Management?

• IRM = Management of the “Insider Threat”

• “Insider Threat” = Risk of actions of an Insider

• Malicious Insider = Current or former employees or contractors who:– intentionally exceeded or misused an authorized

level of access to networks, systems or data, and;– affected the security of the organizations’ data,

systems, or daily business operations(CERT/US Secret Service Insider Threat Study)

Page 8: Internal Risk Management

What is Internal Risk Management?

• Insider’s intentions can be good or evil

• Actions can be intentional or accidental

• Must consider errors and omissions– Accidents

– Not following process

Page 9: Internal Risk Management

Background

• Not a new issue

• 2007 CSI/FBI Computer Crime Survey - insiders #1 reported problem.– Old issue, awareness is heightening.– Additional monitoring shows what has always

been there.– Some orgs not fully comfortable with the concept.

• 2008 CSI/FBI Computer Crime Survey– Insider threat decreased

Page 10: Internal Risk Management

Background• 2008 Verizon report (based on Verizon caseload)

– Most breaches external

– Most costly breaches internal(mostly end-users or admin/root)

– Greatest overall risk - Trusted Partners

• 2009 Verizon report– Most = external, most costly = internal

– Greatest overall risk - external sources!

– But…• 39% multiple parties

• Didn’t consider insiders’ “inaction”

Page 11: Internal Risk Management

Background

• 2009 Ponemon/Symantec study– 950 people who lost/left jobs

– 60% took confidential info (cd/usb/email)

– 82% did not have exit review

– 24% had network access after leaving

• US CERT actively studying this issue

Page 12: Internal Risk Management
Page 13: Internal Risk Management
Page 14: Internal Risk Management

From: Dark Reading http://darkreading.com/insiderthreat

Page 15: Internal Risk Management

Types of Internal Risks• Fraud: obtaining property or services from the

organization unjustly through deception or trickery. – Sale of data– Modification of data for pay (licenserecords, criminal records, welfare status)– Stealing money (financial institutions,

government, etc…)• Theft of Information: stealing confidential or

proprietary information from the organization.– Theft of: customer information, source code,

data

Page 16: Internal Risk Management

Types of Internal Risks• IT Sabotage: acting with intention to harm a

specific individual, the organization, or the organization’s data, systems, and/or daily business operations.– Deletion of data, logic bombs, defacement,

extortion (encryption)• Error/Omission: causing damage to assets or

disclosure of information because of an unintentional mistake.– Leaving a system vulnerable (not patching,

config error, etc.)– Improper disclosure (database accessible,

posting to website, etc.)

Page 17: Internal Risk Management
Page 18: Internal Risk Management
Page 19: Internal Risk Management
Page 20: Internal Risk Management

• If disgruntled => unmet expectations

• Stressors contributed

• Behavioral precursors often observable but ignored

• Majority attacked after termination

• Created/used access paths unknown to management

• Organizations failed to detect technical precursors.

• Lack of proper access controls

http://www.cert.org/insider_threat/

Observations from CERT Insider Threat Study

Page 21: Internal Risk Management

What do we do?

Page 22: Internal Risk Management

CERT Good Practices• Risk assessments - insider/partners threats• Document and enforce policies and

controls.• Security awareness training• Monitor and respond to suspicious or

disruptive behavior, beginning with the hiring process.

• Anticipate/manage negative workplace issues.

Page 23: Internal Risk Management

CERT Good Practices

• Secure the physical environment.

• Password and account management.

• Separation of duties and least privilege.

• SDLC - Consider insider threats

• Consider extra controls for privileged users.

Page 24: Internal Risk Management

CERT Good Practices

• Change control

• Log, monitor, and audit

• Defense in Depth

• Deactivate access after termination

• Secure backup and recovery

• Incident response plan

Page 25: Internal Risk Management

According to Schneier

Five basic techniques to deal with trusted people (Schneier):

• Limit the number of trusted people. • Ensure that trusted people are also

trustworthy. • Limit the amount of trust each person has.• Give people overlapping spheres of trust.• Detect breaches of trust after the fact and

issue sanctions.

Page 26: Internal Risk Management

ShackF00Security areas of focus during layoffs (Dave

Shackleford – ShackF00 blog)• Monitor logs• Watch the back door• Monitor physical access• Institute strict change monitoring of code and

files• Revocation of access to resources• Reclaiming corporate computing assets• Forensics

Page 27: Internal Risk Management

The DHS Approach

• SMT briefing– Philosophical direction

– Previous focus on external threats

– New area of focus

– Cross-divisional work – Security, Privacy, Audit, Legal, Compliance

– Culture change - May not be popular

Page 28: Internal Risk Management
Page 29: Internal Risk Management

Examples• Background studies• Media/device

encryption• Privileged

accounts/Local Admin/activity

• Improved provisioning• Annual recertification

• Security Lifecycle Management

• Training via audio/video

• Improved server control software /logging/NBA

• Improved change management

The DHS Approach

Page 30: Internal Risk Management

Next Steps

• Examining current environment and resources

• Plan mitigations

• Create recommended project/tools list

• Create implementation plan

Page 31: Internal Risk Management

Where to Learn More…

• CMU CyLab - http://www.cylab.cmu.edu/

• CERT - http://www.cert.org/insider_threat/

• Data Breach Blog - http://breach.scmagazineblogs.com/

• OSF DataLossdb - http://datalossdb.org/

• Dark Reading - http://darkreading.com/insiderthreat/

Page 32: Internal Risk Management

Discussion…