who is the next target proactive approaches to data security

59
WHO IS THE NEXT TARGET? WHO IS THE NEXT TARGET? Proactive Approaches to Data Security Ulf Mattsson CTO, Protegrity [email protected]

Upload: ulf-mattsson

Post on 15-Jan-2015

558 views

Category:

Technology


3 download

DESCRIPTION

The landscape of threats to sensitive data is changing.  New technologies bring with them new vulnerabilities, and organizations like Target are failing to react properly to the shifts around them. What's needed is an approach equal to the persistent, advanced attacks companies face every day.  The sooner we start adopting the same proactive thinking hackers are using to get at our data, the better we will be able to protect it. 

TRANSCRIPT

Page 1: Who is the next target   proactive approaches to data security

WHO IS THE NEXT TARGET?WHO IS THE NEXT TARGET?

Proactive Approaches to Data Security

Ulf MattssonCTO, Protegrity

[email protected]

Page 2: Who is the next target   proactive approaches to data security

Working with the Payment Card Industry Security Standards Council (PCI SSC):

• PCI SSC Tokenization Task Force

• PCI SSC Encryption Task Force

• PCI SSC Point to Point Encryption Task Force

• PCI SSC Risk Assessment SIG

Ulf Mattsson & PCI Data Security Standards

• PCI SSC eCommerce SIG

• PCI SSC Cloud SIG

• PCI SSC Virtualization SIG

• PCI SSC Pre-Authorization SIG

• PCI SSC Scoping SIG

• PCI SSC 2013 – 2014 Tokenization Task Force

2

Page 3: Who is the next target   proactive approaches to data security

New threats and methods of attack

New technologies offer new vulnerabilities

Lessons learned from the Target breach

Topics

Lessons learned from the Target breach

The importance of proactive thinking

New technologies to properly secure data

3

Page 4: Who is the next target   proactive approaches to data security

THE CHANGING THREAT LANDSCAPETHREAT LANDSCAPE

4

How have the methods of attack shifted?

Page 5: Who is the next target   proactive approaches to data security

Data Loss Worries IT Pros Most

5

Source: 2014 Trustwave Security Pressures Report

Page 6: Who is the next target   proactive approaches to data security

Data Loss Worries IT Pros Most

6

Source: 2014 Trustwave Security Pressures Report

Page 7: Who is the next target   proactive approaches to data security

“It’s clear the bad guys are winning at a faster rate than the good guys

Security - We Are Losing Ground

7

Source: searchsecurity.techtarget.com/news/2240215422/In-2014-DBIR-preview-Verizon-says-data-breach-response-gap-widening

rate than the good guysare winning, and we’ve got to solve that.”- 2014 Verizon Data Breach Investigations Report

Page 8: Who is the next target   proactive approaches to data security

Security - We Are Losing Ground

“…Even though security is improving, things are getting worse faster, so

8

getting worse faster, so we're losing ground even as we improve .”- Security expert Bruce Schneier

Source: http://www.businessinsider.com/bruce-schneier-apple-google-smartphone-security-2012-11

Page 9: Who is the next target   proactive approaches to data security

Security - We Are Losing Ground

“Cyber attack fallout could cost the global economy $3 trillion by

9

Source: McKinsey report on enterprise IT security implications released in January 2014.

economy $3 trillion by 2020.”

Page 10: Who is the next target   proactive approaches to data security

PRIME TARGETS FOR DATA BREACHDATA BREACH

10

Page 11: Who is the next target   proactive approaches to data security

CIA and NSA Tell Utilities How To Up Cybersecurity

11

Source: Smart Grid News

The Bipartisan Policy Center (BPC) has published a new report titled "Cybersecurity and the North American Electric Grid: New Policy Approaches to

Address an Evolving Threat."

Page 12: Who is the next target   proactive approaches to data security

The U.S. government's Industrial Control Systems Cyber Emergency Response Team

Responded to more than 200 incidents

53% aimed at the energy sector.

So far, there have not been any successful catastrophic attacks on the US energy grid

Energy Sector a Prime Target for Cyber Attacks

attacks on the US energy grid

Ongoing debate about the risk of a "cyber Pearl Harbor" attack.

Source: www.csoonline.com/article/748580/energy-sector-a-prime-target-for-cyber-attacks(Oct. 2012 - May 2013)

12

Page 13: Who is the next target   proactive approaches to data security

The global energy sector has become vulnerable to cyber-attack

Increasingly adopting internet-based industrial control systems in an effort to cut costs

The industry has yet to experience business

Energy Sector Faces Cyber-attack Threat: Marsh

interruption or physical damage as a result of a cyber-attack

Being "disproportionately" targeted by increasingly sophisticated hacker networks the broker

Source: 2014 Report, Insurance broker Marsh

13

Page 14: Who is the next target   proactive approaches to data security

BEWARE MALWAREBEWARE MALWARE

14

Page 15: Who is the next target   proactive approaches to data security

15

Page 16: Who is the next target   proactive approaches to data security

New Malware

Source: mcafee.com/us/resources/reports/rp-quarterly-threat-q3-2013.pdf

16

Page 17: Who is the next target   proactive approaches to data security

Total Malicious Signed Malware

Source: mcafee.com/us/resources/reports/rp-quarterly-threat-q3-2013.pdf

17

Page 18: Who is the next target   proactive approaches to data security

Targeted Malware Topped the Threats

18

62% said that the pressure to protect from data breaches also increased over the past year.

Source: 2014 Trustwave Security Pressures Report

Page 19: Who is the next target   proactive approaches to data security

US - Targeted Malware Top Threat

19

Source: 2014 Trustwave Security Pressures Report

Page 20: Who is the next target   proactive approaches to data security

FBI uncovered 20 cyber attacks against retailers in the past year that utilized methods similar to Target incident

Believe POS malware crime will continue to grow over the near term

Despite law enforcement and security firms' actions to mitigate it

FBI Memory-Scraping Malware Warning

mitigate it

Report: “Recent Cyber Intrusion Events Directed Toward Retail Firms”

Source: searchsecurity.techtarget.com/news/2240213143/FBI-warns-of-memory-scraping-malware-in-wake-of-Target-breach

20

Page 21: Who is the next target   proactive approaches to data security

THE CHANGING TECHNOLOGY TECHNOLOGY LANDSCAPE

What effect, if any, does the rise of “Big Data” have on breaches?

21

Page 22: Who is the next target   proactive approaches to data security

Has Your Organization Already Invested in Big Data?

22

Source: Gartner

Page 23: Who is the next target   proactive approaches to data security

Holes in Big Data…

23

Source: Gartner

Page 24: Who is the next target   proactive approaches to data security

Many Ways to Hack Big Data

24

Hackers& APT

RoguePrivileged

Users

UnvettedApplications

OrAd Hoc

Processes

Page 25: Who is the next target   proactive approaches to data security

Many Ways to Hack Big Data

MapReduce(Job Scheduling/Execution System)

Pig (Data Flow) Hive (SQL) Sqoop

ETL Tools BI Reporting RDBMS

Avr

o (S

eria

lizat

ion)

Zoo

keep

er (

Coo

rdin

atio

n)

Hackers

UnvettedApplications

OrAd Hoc

Processes

Source: http://nosql.mypopescu.com/post/1473423255/apache-hadoop-and-hbase

25

HDFS(Hadoop Distributed File System)

Hbase (Column DB)

Avr

o (S

eria

lizat

ion)

Zoo

keep

er (

Coo

rdin

atio

n)

PrivilegedUsers

Page 26: Who is the next target   proactive approaches to data security

Big Data (Hadoop) was designed for data access, not security

Security in a read-only environment introduces new challenges

Massive scalability and performance requirements

Big Data Vulnerabilities and Concerns

Sensitive data regulations create a barrier to usability, as data cannot be stored or transferred in the clear

Transparency and data insight are required for ROI on Big Data

26

Page 27: Who is the next target   proactive approaches to data security

TARGET DATA BREACHBREACH

27

What can we learn from the Target breach?

Page 28: Who is the next target   proactive approaches to data security

Target Breach Optioned as Sony Feature Film

28

Source: Welivesecurity.com

Page 29: Who is the next target   proactive approaches to data security

Target Corp. said in its annual report that a massive security breach has hurt its image and business, while spawning dozens of legal actions, and it noted it can't estimate how big the financial tab will end up being

Security software picked up on suspicious activity

Target Says It Ignored Early Signs of Data Breach

Security software picked up on suspicious activity after a cyberattack was launched, but it decided not to take immediate action

Received security alerts on Nov. 30 that indicated malicious software had appeared in its network

Source: SEC (Securities and Exchange Commission )

29

Page 30: Who is the next target   proactive approaches to data security

Target Data Breach, U.S. Secret Service & iSIGHT

Target CIO Beth Jacob resigned

30

Page 31: Who is the next target   proactive approaches to data security

Memory Scraping Malware – Target Breach

Payment CardTerminal

Point Of Sale Application

Memory Scraping Malware

Authorization,Settlement

Web Server

Memory Scraping Malware

Russia

31

Page 32: Who is the next target   proactive approaches to data security

Credentials were stolen from Fazio Mechanical in a malware-injecting phishing attack sent to employees of the firm by email

• Resulted in the theft of at least 40 million customer records containing financial data such as debit and credit card information.

• In addition, roughly 70 million accounts were compromised that included addresses and mobile numbers.

The data theft was caused by the installation of malware on

How The Breach at Target Went Down

the firm's point of sale machines

The subsequent file dump containing customer data is reportedly flooding the black market

• Starting point for the manufacture of fake bank cards, or provide data required for identity theft.

Source: Brian Krebs and www.zdnet.com/how-hackers-stole-millions-of-credit-card-records-from-target-7000026299/

32

Page 33: Who is the next target   proactive approaches to data security

The FTC is probing the massive hack of credit card information

Target could face federal charges for failing to protect its customers' data from hackers

When you see a data breach of this size with clear harm to consumers, it's clearly something that the

Target May Face Federal Suit Over Privacy Fumble

harm to consumers, it's clearly something that the FTC would be interested in looking at," said Jon Leibowitz, a former FTC chairman

Sen. Richard Blumenthal, a Connecticut Democrat, urged the FTC to investigate the Target hack soon after it became public in December

Source: Bloomberg Businessweek

33

Page 34: Who is the next target   proactive approaches to data security

Who Is The Next Target?

34

Page 35: Who is the next target   proactive approaches to data security

It’s not like other businesses are using some special network security practices that Target

doesn’t know about.

They just haven’t been hit yet.

No number of traps, bars, or alarms will keep out the determined thief

Source: www.govtech.com/security

35

Page 36: Who is the next target   proactive approaches to data security

THINKING LIKE A HACKERHACKER

How can we shift from reactive to proactive thinking?

36

Page 37: Who is the next target   proactive approaches to data security

The Modern Day Bank Robber

37

Page 38: Who is the next target   proactive approaches to data security

Current Breach Discovery Methods

38

Verizon 2013 Data-breach-investigations-report & 451 Research

Page 39: Who is the next target   proactive approaches to data security

You must assume the systems will be breached.

Once breached, how do you know you've been compromised?

You have to baseline and understand what 'goodness' looks like and look for deviations from goodness

McAfee and Symantec can't tell you what normal looks like in your own systems.

Only monitoring anomalies can do that

CISOs say SIEM Not Good for Security Analytics

Only monitoring anomalies can do that

Monitoring could be focused on a variety of network and end-user activities, including network flow data, file activity and even going all the way down to the packets

Source: 2014 RSA Conference, moderator Neil MacDonald, vice president at Gartner

39

Page 40: Who is the next target   proactive approaches to data security

TURNING THE TIDE

40

What new technologies and techniques can be used to prevent future attacks?

Page 41: Who is the next target   proactive approaches to data security

What if a

Social Security number or

Credit Card Number Credit Card Number

in the Hands of a Criminal

was Useless?

41

Page 42: Who is the next target   proactive approaches to data security

COMPLIANCEVS.

SECURITYSECURITY

42

Page 43: Who is the next target   proactive approaches to data security

Target was certified as meeting the standard for the payment card industry in September 2013

Compliance can protect us from liability, but whether it actually protects us from loss of business and loss of data is not so clear

Compliance is a minimal deterrent that everyone

Target Breach Lesson: PCI Compliance Isn't Enough

Compliance is a minimal deterrent that everyone has to have in place

If you're driving a car, you're expected to have a driver's license. That doesn't make you a safe driver

Source: TechNewsWorld

43

Page 44: Who is the next target   proactive approaches to data security

Protection of cardholder data in memory

Clarification of key management dual control and split knowledge

Recommendations on making PCI DSS business-as-usual and best practices

Security policy and operational procedures added

PCI DSS 3.0

Security policy and operational procedures added

Increased password strength

New requirements for point-of-sale terminal security

More robust requirements for penetration testing

44

Page 45: Who is the next target   proactive approaches to data security

Coarse Grained Security

• Access Controls

• Volume Encryption

• File Encryption

Fine Grained Security

Evolution of Data Security Methods

Time

Fine Grained Security

• Access Controls

• Field Encryption (AES & )

• Masking

• Tokenization

• Vaultless Tokenization

45

Page 46: Who is the next target   proactive approaches to data security

Old and flawed:

Minimal access

levels so people

can only carry

Access Control

Risk

High –

can only carry

out their jobs

46

AccessPrivilege

LevelI

High

I

Low

Low –

Page 47: Who is the next target   proactive approaches to data security

Applying the Protection Profile to the

Structure of each Sensitive Data Fields allows for Sensitive Data Fields allows for

a Wider Range of Granular Authority Options

47

Page 48: Who is the next target   proactive approaches to data security

Examples: De-Identified Sensitive Data Field Real Data Tokenized / Pseudonymized

Name Joe Smith csu wusoj

Address 100 Main Street, Pleasantville, CA 476 srta coetse, cysieondusbak, CA

Date of Birth 12/25/1966 01/02/1966

Telephone 760-278-3389 760-389-2289

E-Mail Address [email protected] [email protected]

SSN 076-39-2778 076-28-3390

CC Number 3678 2289 3907 3378 3846 2290 3371 3378

Business URL www.surferdude.com www.sheyinctao.com

Fingerprint Encrypted

Photo Encrypted

X-Ray Encrypted

Healthcare / Financial Services

Dr. visits, prescriptions, hospital stays and discharges, clinical, billing, etc.Financial Services Consumer Products and activities

Protection methods can be equally applied to the actual data, but not needed with de-identification

48

Page 49: Who is the next target   proactive approaches to data security

Risk

High –

Old:

Minimal access

levels – Least New :

Much greater

The New Data Protection - Tokenization

AccessPrivilege

LevelI

High

I

Low

Low –

levels – Least

Privilege to avoid

high risks

Much greater

flexibility and

lower risk in data

accessibility

49

Page 50: Who is the next target   proactive approaches to data security

Tokenization Research

Tokenization Gets Traction

Aberdeen has seen a steady increase in enterprise use of tokenization for protecting sensitive data over encryption

Nearly half of the respondents (47%) are currently using tokenization for something other than cardholder data

Tokenization users had 50% fewer security-related incidents than tokenization non-users

50

Source: http://www.protegrity.com/2012/08/tokenization-gets-traction-from-aberdeen/

Page 51: Who is the next target   proactive approaches to data security

Security of Different Protection Methods

High

Security Level

I

Format

Preserving

Encryption

I

Vaultless

Data

Tokenization

I

AES CBC

Encryption

Standard

I

Basic

Data

Tokenization

51

Low

Page 52: Who is the next target   proactive approaches to data security

Fine Grained Data Security Methods

Tokenization and Encryption are Different

Used Approach Cipher System Code System

Cryptographic algorithms

Cryptographic keys

TokenizationEncryption

52

Cryptographic keys

Code books

Index tokens

Source: McGraw-HILL ENCYPLOPEDIA OF SCIENCE & TECHNOLOGY

Page 53: Who is the next target   proactive approaches to data security

10 000 000 -

1 000 000 -

100 000 -

10 000 -

Transactions per second*

Speed of Different Protection Methods

10 000 -

1 000 -

100 -I

Format

Preserving

Encryption

I

Vaultless

Data

Tokenization

I

AES CBC

Encryption

Standard

I

Vault-based

Data

Tokenization

*: Speed will depend on the configuration

53

Page 54: Who is the next target   proactive approaches to data security

Different Tokenization Approaches

Property Dynamic Pre-generated Vaultless

Vault-based

54

Page 55: Who is the next target   proactive approaches to data security

Use

Case

How Should I Secure Different Data?

Simple –PCI

PII

Encryption

of Files

CardHolder Data

Tokenization of Fields

Personally Identifiable Information

Type of

DataI

Structured

I

Un-structured

Complex – PHI

ProtectedHealth

Information

55

Personally Identifiable Information

Page 56: Who is the next target   proactive approaches to data security

Use Big Data to Analyze Abnormal Usage Pattern

Payment CardTerminal

Point Of Sale Application

Memory Scraping Malware

Authorization,Settlement

Web Server

Memory Scraping Malware

Moscow, Russia

FireEye

Malware?

Page 57: Who is the next target   proactive approaches to data security

Trend - Open Security Analytics Frameworks

57 Source: Emc.com/collateral/white-paper/h12878-rsa-pivotal-security-big-data-reference-architecture

Enterprise Big Data Lake

Page 58: Who is the next target   proactive approaches to data security

ConclusionsChanging threat landscape & challenges to secure da ta:

• Attackers are looking for not just payment data – a more serious problem.

• IDS systems are lacking context needed to catch data theft

• SIEM detection is too slow in handling large amounts of events.

What happened at Target ?• Modern customized malware can be very hard to detect

58

• They were compliant, but not secure

How can we prevent what happened to Target and the next attack against our sensitive data?

• Assume that we are under attack - proactive protection of the data itself

• We need to analyze event information and context to catch modern attackers

• The Oracle Big Data Appliance can provide the foundation for solving this problem

Page 59: Who is the next target   proactive approaches to data security

Thank you!Thank you!

Questions?

Please contact us for more information

http://www.protegrity.com/news-resources/collateral/

[email protected]