welcome [] · 6 security questions to ask it welcome what do you hope to learn today? please take a...

32
6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to ensure that we cover the topics/areas of interest. We will collect them before we get started. Thanks!

Upload: dangxuyen

Post on 03-Jul-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

6 Security Questions to Ask IT

Welcome

What do you hope to learn today?

Please take a moment to fill out the yellow cards.

Our presenters will review the cards to ensure that we cover the topics/areas of interest.

We will collect them before we get started.

Thanks!

Page 2: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to
Page 3: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Collect ‘Learn Today’ Cards

What do you hope to learn today?

Please take a moment to fill out the yellow cards.

Our presenters will review the cards to ensure that we cover the topics/areas of interest.

We will collect them before we get started.

Thanks!

Page 4: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

The 6 Questions:

-Dual Factor Authentication- Host Intrusion- Network Intrusion- Proxying- Password Managers- Securing your Software Development Life Cycle

Page 5: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Question 1: Are you using MultiFactor Authentication? (Easy, not free)1. AKA Dual Factor Authentication, Two Factor Authentication, MFA, 2FA2. Passwords are vulnerable.

1. Guessing2. Brute Force3. Social Engineering4. Keystroke Logger5. Re-Use6. Observation7. Wireless8. Security Questions/Password resets9. Spear Phishing10.DNS Redirection

Page 6: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

2FA1. Something You Know

1. Password2. Something you have

1. Finger Printer Reader2. Iris or Retina Scanner3. Token4. Cell Phone with Soft Token5. SMS

Page 7: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

DEMO1.Duo Security (With Confluence, Our Wiki)2.Auth Anvil (With Kaseya)

Page 8: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Issues1.Not all 2FA systems work with all applications

(Websites, Email, VPN, RDP, Etc2.The easiest/best systems cost a few dollars/month/user3.Locally Hosted? Better keep up 2FA system!

(Or Know how to disable)4.Cloud Hosted? They go down too.

(Better know how to disable!)5.Lost/Replacement Cell phones6.Very good reporting of who logged in!

Page 9: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Apr 11, 2017 4:03 PM

broswell Confluence Authentication Access GrantedTrusted network

Hunt Valley, MD209.251.37.8

Apr 11, 2017 3:51 PM

erainey Confluence Authentication Access GrantedTrusted network

Hunt Valley, MD209.251.37.8

Apr 11, 2017 3:48 PM

mstough Confluence Authentication Access GrantedUser approved

York, PA174.55.67.131

Duo PushMike's Galaxy s6 (717-8

Page 10: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Question 2: Are you using Host Intrusion? (Easy, Free)

• Alert on significant changes to your Windows, Linux, VMware or Mac Computers

• I prefer OSSEC (Open Source Security• Free!• Server runs on any tiny Linux box Could be $10 Raspberry Pi• Clients for Most Operating Systems

Page 11: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

** Alert 1491837854.194: - web,appsec,attack2017 Apr 10 15:24:14 production->/var/log/nginx/access.logRule: 31508 (level 6) -> 'Blacklisted user agent (known malicious user agent).'Src IP: 88.198.66.23088.198.66.230 - - [10/Apr/2017:15:24:14 +0000] "GET /contact/?color=black-white HTTP/1.1" 301 185 "-" "Mozilla/5.0 (compatible; MJ12bot/v1.4.7; http://mj12bot.com/)" "-"

** Alert 1491839124.1381: - syslog,sshd,authentication_success,2017 Apr 10 15:45:24 production->/var/log/secureRule: 5715 (level 3) -> 'SSHD authentication success.'Src IP: 98.233.144.193User: broswellApr 10 15:45:22 production sshd[27920]: Accepted password for broswell from 98.233.144.193 port 52590 ssh2

** Alert 1491843243.4579: mail - syslog,yum,config_changed,2017 Apr 10 16:54:03 production->/var/log/messagesRule: 2933 (level 7) -> 'Yum package updated.'Apr 10 16:54:01 production yum[29021]: Updated: 1:openssl-1.0.1k-15.99.amzn1.x86_64

** Alert 1491843243.4823: mail - syslog,yum,config_changed,2017 Apr 10 16:54:03 production->/var/log/messagesRule: 2933 (level 7) -> 'Yum package updated.'Apr 10 16:54:02 production yum[29021]: Updated: 1:nginx-1.10.2-1.30.amzn1.x86_64

Page 12: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Question 3: Are you using Proxies to protect your Infrastructure?(Easy, Free implementations probably only solve part of problem)1. Definition of Proxies2. Probably already using for Email

1. ProofPoint, Postini, ForeFront etc3. Consider for Websites

1. Incapsula, CloudFlare, AWS Cloudfront, Akamai, Edgecast2. More at

https://en.wikipedia.org/wiki/Content_delivery_network4. Same idea for VoIP, Video with Sip, H323 Proxies

Page 13: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Question 4: Are you using a Network Intrusion System (Free->Expensive, Hard->Very Hard1. Cisco Firepower Services on ASA2. SELKS (Suricata, ElasticSearch, Logstash, Kibana)

1. Crazy amount of malicious traffic on our network in front of firewalls (500 600 events per minute)

2. Manageable but much less interesting and fun behind firewall.

Page 14: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Steve Simons

Page 15: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Team Building

Technology Empowerment

Business Strategy

Page 16: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Business Strategy

• Determine the Right Vision

• Design the Right Process

• Build the Right Team

• Leverage the Right Technology

Restyn enables businesses to become the best version of themselves through insightful leadership and creation of

visionary and grounded enterprise solutions.

Team Building

Technology Empowerment

Business Strategy

Page 17: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Team Building

• Management Consulting

• Leadership Coaching

• Staffing and Team Development

• Culture Creation/Evolution

Restyn is your source for “In Country Outsourcing", enabling your business to

reach higher and achieve more by involving highly-reputed, experienced, and

knowledgeable advisers.

Team Building

Technology Empowerment

Business Strategy

Page 18: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Team Building

Technology Empowerment

Business Strategy

Technology Empowerment

• People Driven

• Process Aligned

• Strategically Selected

• Architecturally Sound

• Fully Engaged

• Broadly Adopted

Aligning, developing, and implementing best-in-class integrated enterprise solutions can give you the competitive advantage to fulfill

your company’s vision.

Page 19: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Question 5: Password Management

Page 20: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

AES-256 bit encryption with PBKDF2 SHA-256, Local Only Encryption, and Two Factor Authentication

Enterprise Features: SSO, User Management, Compliance Reporting, Policy Enforcement

Page 21: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Question 6: Securing Your SDLC

Page 22: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Ultimate Security – Write Only Memory (WOM)

4/13/2017©2017 Restyn, LLC- All Rights Reserved.

CONFIDENTIAL and PROPRIETARY – Do Not Distribute.22

Page 23: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Write-Only Memory (WOM)

“write-only memory: A form of computer memory into which information can be stored but never, ever retrieved, developed under government contract in 1975 by Professor Homberg T. Farnsfarfle. Farnsfarfle's original prototype, approximately one inch on each side, has so far been used to store more than 100 trillion words of surplus federal information. Farnsfarfle's critics have denounced his project as a six-million-dollar boondoggle, but his defenders point out that this excess information would have cost more than 250 billion dollars to store in conventional media.” - Apple IIe Reference Manual (part number A2L2005), page 250.

4/13/2017©2017 Restyn, LLC- All Rights Reserved.

CONFIDENTIAL and PROPRIETARY – Do Not Distribute.23

Page 24: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Obtaining Security

• Do Not Process

• Do Not Store

• Do Not Connect

• Do Not Transmit

• Do Not Receive

• Do Not Grant Access

• Do Not Communicate

• Do Not Code

• Do Not ….

Security is a pursuit, not a destination.

4/13/2017©2017 Restyn, LLC- All Rights Reserved.

CONFIDENTIAL and PROPRIETARY – Do Not Distribute.24

Page 25: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Open Web Application Security Project (OWASP) Top 10

• Injection

• Broken Authentication and Session Management

• Cross-Site Scripting (XSS)

• Insecure Direct Object References

• Security Misconfiguration

• Sensitive Data Exposure

• Missing Function Level Access Control

• Cross-Site Request Forgery (CSRF)

• Using Known Vulnerable Components

• Unvalidated Redirects and Forwards

4/13/2017©2017 Restyn, LLC- All Rights Reserved.

CONFIDENTIAL and PROPRIETARY – Do Not Distribute.25

Page 26: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Basic Areas of Focus

• Governance/Compliance

• Education/Training

• Architecture/Design/Development

• Testing/Review

• Deployment/Change Control

• Configuration/Administration

• Vulnerability/Bug Incident Response

4/13/2017©2017 Restyn, LLC- All Rights Reserved.

CONFIDENTIAL and PROPRIETARY – Do Not Distribute.26

Page 27: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Deploy to PROD

Deploy Solution to QA

Example Software Development Life Cycle

4/13/2017©2016 Restyn, LLC- All Rights Reserved.

CONFIDENTIAL and PROPRIETARY – Do Not Distribute.27

Business Requirements Solution DesignFunctional/Technical

Requirements

Development in DEVTest Development in DEV

Test Solution in QA Bugfixes and Redeploy to QA Deploy to UAT

Test Solution in UATBugfixes and Redeploy to QA

Release Notes PROD Test/Hotfix Training

Page 28: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

DEVELOPMENT

UAT STAGE

Build Change Control Into Your Environment

4/13/2017©2016 Restyn, LLC- All Rights Reserved.

CONFIDENTIAL and PROPRIETARY – Do Not Distribute.28

PRODUCTION

QA STAGE

Page 29: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Segregation of Duties

• Business Analysis

• Project Management

• Software Architecture

• Software Development

• Quality Assurance Testing

• User Acceptance Testing

• System Administration

• Change Control

• Security Testing

• Operations Management

• Security Management

• Internal Audit

• External Audit

4/13/2017©2017 Restyn, LLC- All Rights Reserved.

CONFIDENTIAL and PROPRIETARY – Do Not Distribute.29

Page 30: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Build Reviews Into Every Step of the Process

• Risk Analysis

• System Analysis

• Security Requirements

• Architecture/Solution Security Review

• Test Plan Security Review

• Project Plan Security Review

• Static Code Scanning

• Code Security Review

• Configuration Security Review

• Log Analysis / Review

• Bug/Vulnerability Analysis & Review

• Incident Response Review

• Internal and External Process/Controls/Compliance Review

• User Adoption/Training Review

4/13/2017©2017 Restyn, LLC- All Rights Reserved.

CONFIDENTIAL and PROPRIETARY – Do Not Distribute.30

Page 31: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Thank You!www.restyn.com

4/13/2017©2017 Restyn, LLC- All Rights Reserved.

CONFIDENTIAL and PROPRIETARY – Do Not Distribute. 31

Page 32: Welcome [] · 6 Security Questions to Ask IT Welcome What do you hope to learn today? Please take a moment to fill out the yellow cards. Our presenters will review the cards to

Learning Center Offer

Evaluations

Door Prizes

Thank You!