Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×

AKAMAI_2022 攻擊變化莫測 防禦勝在邊緣.pdf

Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Próximo SlideShare
滕达斐
滕达斐
Cargando en…3
×

Eche un vistazo a continuación

1 de 20 Anuncio

Más Contenido Relacionado

Similares a AKAMAI_2022 攻擊變化莫測 防禦勝在邊緣.pdf (20)

Más reciente (20)

Anuncio

AKAMAI_2022 攻擊變化莫測 防禦勝在邊緣.pdf

  1. 1. 攻擊變化莫測 防禦勝在邊緣 王明輝 Kevin Wang Akamai大中華區 資深技術顧問
  2. 2. © 2022 Akamai | Confidential 2 根據英國NCSC調查,遠端連線如VPN, RDP, Email釣魚是最 經常被使用的攻擊手法 https://www.ncsc.gov.uk/collection/ncsc-annual-review-2021/the-threat/ransomware-threat-methodology 攻擊面積大 驗證及裝置檢測薄弱 網路權限過大 App 1 Firewall Application Access Control Network Access Control User Client App 2 Application Access Control App 3
  3. 3. © 2022 Akamai | Confidential 3 當你的設備都智能化後,IoT設備的風險如何管控? https://www.forbes.com/sites/daveywind er/2020/09/27/hacker-takes-coffee- machine-hostage-in-surreal- ransomware-attack/#559bbd8177f0
  4. 4. © 2022 Akamai | Confidential 4 扁平式網路讓你快速被攻陷
  5. 5. © 2022 Akamai | Confidential 5 COVID-19的防治,套用在現行的勒索病毒 • 宣導 • 疫苗 • 篩檢 • 隔離 • 員工教育訓練 • 系統補強、弱掃、認證 • 防毒/EDR/WAF/SWG • 網路隔離 • 加強防護意識 • 減少攻擊面積 • 檢查行為,保護本機 • 範圍控制並防止擴散 但很多人講不聽 各種系統弱點不斷被發現 病毒不斷變化且處理誤判 Initial Infection Execution Persistence Priv Esc Cred Access Lateral Movement Collection CnC Exfiltration Impact
  6. 6. © 2022 Akamai | Confidential 6 勒索軟體 & 不佳的網路隔離實踐
  7. 7. © 2022 Akamai | Confidential 7 經由防火墻或L3 SW的Segmentation
  8. 8. © 2022 Akamai | Confidential 8 Micro Segmentation網路
  9. 9. © 2022 Akamai | Confidential 9 重新思考”防火牆” Data Center Cloud The Old Way ▪ 環境和實體網路緊密相連 ▪ 可視性有限 (L3/L4) ▪ 緩慢且難以改變 ▪ 以網路為中心的策略 ▪ 軟體定義防火牆 ▪ 高可視性 (L7) ▪ 高精細度策略 ▪ 以工作負載為中心的策略 The New Way Physical firewall appliances creating network choke points Virtual firewall appliances creating network choke points Data Center Cloud Software-based policies based on finer-grained attributes (e.g., process, user, fully-qualified domain name)
  10. 10. © 2022 Akamai | Confidential 10 Akamai Guardicore主要功能 可視性 45 applications 6 weeks vs. 1.5 years No downtime 邏輯分組 Up to 99% attack surface reduction 智能策略 Deception FIM Reputation Insight Scan detect 違規檢測和回應
  11. 11. © 2022 Akamai | Confidential 11 可視性:收集資產及流量資訊 – 設備間如何對談? 使用什麼port,程序? supports NetFlow, sFlow and IPFIX
  12. 12. © 2022 Akamai | Confidential 12 資產標記: 透過標籤自動或手動將資產分類及管理 - 加強可視性、創建策略、資產管理、權限管理
  13. 13. © 2022 Akamai | Confidential 13 標籤完成即可自動產生邏輯分組 – 建立設備連線邏輯關係,以不同角度暸解互動關係,是否有不合規活動
  14. 14. © 2022 Akamai | Confidential 14 Patient Zero 打破攻擊鏈 – 真實案例 Customer noticed a machine was trying to infect other machines in the network… Threat actor was attempting lateral movement from the initially infected machine. IoC’s indicated DarkSide.
  15. 15. © 2022 Akamai | Confidential 15 智能策略(label, IP, port, process/service, AD User, domain) - 手動、拓樸圖、系統建議、Template(app, ransomeware…等)
  16. 16. © 2022 Akamai | Confidential 16 Process vs Service
  17. 17. © 2022 Akamai | Confidential 17 定期盤點並自動註記不合規的資產 • 搜尋某個惡意程序/Hash存在於哪些資產中 • SELECT * FROM programs WHERE name LIKE '%wireshark%'; • 搜尋防毒軟體在哪些資產中被停用 • SELECT name, state_timestamp, remediation_path, state FROM windows_security_products WHERE (select count(*) from windows_security_products where type='Antivirus' and state='On') == 0 and type='Antivirus' and not state='On’; • 搜尋哪些資產有log4j風險 • SELECT CASE WHEN NOT EXISTS (SELECT 1 FROM patches WHERE hotfix_id…. https://github.com/guardicode/osquery
  18. 18. © 2022 Akamai | Confidential 18 Why Akamai Guardicore
  19. 19. © 2022 Akamai | Confidential 20

×