SlideShare una empresa de Scribd logo
1 de 17
(c) 2014 All rights reserved. Insider Threat Kill Chain 1
Insider Threat Kill Chain
Detecting Human Factors of Compromise
Tarun Gupta
Information Security Expert
email@tgupta.com
(c) 2014 All rights reserved. Insider Threat Kill Chain 2
“Your organization’s greatest
asset is also its greatest threat.”
PEOPLE.
Case Study : Insider Threat
(c) 2014 All rights reserved. Insider Threat Kill Chain 3
 Hosting Company; Location Confidential (NDA)
 Disgruntled System Admin; No bonus for last 4 years
 5000+ e-Commerce Websites Down; Holiday Season (--$$$$)
 < 2 minutes and 100 characters of code
 Moved Apache Config File; Service Did not re-Start
Disgruntled Web Server Administrator Breaking Bad
Research & Statistics : Insider Threat
(Forrester)
(c) 2014 All rights reserved. Insider Threat Kill Chain 4Source : Forrester Study “Understand the State of Data Security and Privacy. 2013”
Bottom-line : Insiders carry on as a major source
of data breach
Research : Insider Threat (PWC)
(c) 2014 All rights reserved. Insider Threat Kill Chain 5
Source : PWC 2013 US Cybercrime Survey Report
Insider Threat Intentions
(c) 2014 All rights reserved. Insider Threat Kill Chain 6
Intentions
 Financial Gain
 Career Advancement;
Promotion
 Revenge; Disgruntled
 Thrill; Curiosity
 Personal Motive
 Accidental; Human Error
 Political Cause (Hacktivist)
THREAT = CAPABILITY x
INTENT
Source : CERT breakdown of Insider Threats
IT Sabotage,
21%
Fraud, 37%
IP Theft, 15%
Espionage ,
19%
Others, 8%
Case Study : Insider Threat
(c) 2014 All rights reserved. Insider Threat Kill Chain 7
 7 May 2014 ; Nicholas Paul Knight, 27 (a.k.a. “nuclear black hat”)
 Attempt to hack naval database; while on ship
 Member of Hacking Group; Hacked Pentagon Earlier
 Motivation : Anti-government Sentiment, Boredom and Thrill-
seeking
 Boasted NAVY.MIL Owned
Network Admin Allegedly Hacked Navy ; While on Carrier
Source : http://www.wired.com/2014/05/navy-sysadmin-hacking/
Insider Threat Kill Chain
(c) 2014 All rights reserved. Insider Threat Kill Chain 8
Recruitment/
Tipping Point
Search/
Recon
Acquisition/
Collection
Exfiltration/
Action
Timeline
Prevent Detect Respond
Authorized Credentials
Defensive Controls
Security Policies
Awareness & Training
Access Control
Split Access
Least Privilege
Controls
Event Logging & Review
Integrity Checking
Independent Auditing
Mandatory Rotation
Large Data Transfers
Controls
Backup & Recovery Process
Insider Response Plan
Network & System Audit
Forensics
Quarantine User & Systems
Credential Revoke Process
Indicators
(Technical & Non Technical i.e. HR, Legal, Facility etc.)
Prevent : Human Indicators of Compromise
 Consistently First In & Last Out of Office (always aware & in
control)
 12 Month+ Unused Vacation
 Lifestyle Changes (Spending, Socializing, Marital Status)
 Resigned ; Serving Notice Period
 Lay-Off Notification (Redundant Position)
 Passed over for Promotion/ Raise
 Pending Disciplinary Action or Investigation
Recommended Control – Create HR Watch List
Prevent : Awareness & Training
 Consider Threats from Insiders & Partners in Risk Assessments
 Background Checks (Positions of Trust & Higher Access)
 Clearly Document & Enforce Policies and Controls (Code of
Conduct etc.)
 Periodic Security Awareness Training (Employees, Contractors,
Partners)
 Monitor & Respond to Suspicious or Disruptive Behavior
 Anticipate & Manage Negative Workplace Issues
 Secure and Track Physical Environment
 Establish Clear Lines of Communication and Process between
HR, Legal & IT regarding Information Security
Prevent : Human to Machine Indicators
 Increasing Number of Logins; Variation in Local/Remote
 Logging into Network, Systems, Applications at Odd Times or
Holidays
 Logging in Frequently during Vacation Times
 Remote Logging Using Different Employee Credentials
 Logging from Multiple Locations (Proxy, VPN)
 Changes in Websites Visit; Work vs Personal
 Increased Printer/ Copier/ Scanner Usage
 Export of Large Reports/Data/Downloads from Internal Systems
(USB)
 Executing Broad Database Queries (Select All ….)
Prevent & Detect : Policy & Technology
Controls
 Implement Strict Account & Password Policy
 Enforce Separation of Duties, Split Authority & Least Privilege
 Extra Caution with System, Network, Application & Database
Administrators
 Administer and Review Privileged Users
 Implement System Change Controls (Integrity Checker; Change
Management Process)
 Deactivate System & Network Access on Termination or
Resignation
 Log, Monitor & Audit Employees Network Activity
What to Log ?
 Firewall & Remote Access Logs
 Unsuccessful Login Attempts
 Intrusion Detection Systems (IDS/IPS) Logs
 Web Proxies (Internet Gateway)
 DNS Logs
 Antivirus Alerts
 Change Management Events (Ex. Integrity)
Bare Minimum to Start
Log Intelligence & Analytics
Vulnerability Data
User Activity
Host & Server Activity
Database Activity
Application Activity
Configuration Data Security Devices
Physical Access
Directory
Compliance Reports
Real-Time Correlation “Means” BIG DATA
Actionable
Intelligence
Analytics
Forensics
Retention
All Logs Considered
 Determine Log Volume – Events per Second; Redundant
Information
 Establish Log Management Policies & Procedures – Should
Include Enabling, Retention & Security of Logs; Consult Legal &
Compliance
– What is Collected ?
– Who Manages Logging Systems ? (Segregation of Duties)
 False Positives – Tune Systems; Reduce Noise
 Establish a Baseline – What is Normal Behavior ? , Identify
Anomalies
 Accessing Information – Multiple Departments need to Access;
Challenges with Log Intelligence & SIEM
Insider Threat Response
 Implement Secure Backup & Recovery Processes
– Data, Configuration, Documents & Logs
 Quickly Audit User’s Network & System Behavior
 Quarantine User
– Disconnect User from network (LAN, WAN, Remote)
– Revoke Credentials
– Cease Workstation, Mobile Devices & Equipment
– Disable Physical Facility Access
 Develop an Insider Response Plan (Inter Departmental; IT, HR)
– Communication Protocol (engaging with Insider, confrontation)
– Synchronize with HR Watch List, Resignation etc.
(c) 2014 All rights reserved. Insider Threat Kill Chain 17
Thank You.
DISCLAIMER
The views and opinions expressed herein are those of the author and are based on best practice, research or information
available in public domain. The information contained herein is of a general nature, education and professional use only and is
not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and
timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue
to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough
examination of the particular situation.
The information contained in the attached document is not legal advice but is rather intended to provide guidance or education
use only. While every care has been taken in the preparation of the attached document you should refer to your own legal
counsel for advice on your specific business requirements.
Examples, values and/or sample data is indicative and by no means conclusive. It is strictly for educational and information use
only. Users need to evaluate their business processes and infrastructure to define appropriate levels best suited for business
needs.
All brands and trademarks mentioned in document are possibly registered or protected by third parties are solely subject to the
trademark and ownership rights of the registered owner. The author gives due credit to person/ organization or agency for its
original work or publication.

Más contenido relacionado

La actualidad más candente

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatMike Saunders
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilitiesebusinessmantra
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 

La actualidad más candente (20)

Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Network Security
Network SecurityNetwork Security
Network Security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Physical security
Physical securityPhysical security
Physical security
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilities
 
Cloud security
Cloud securityCloud security
Cloud security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Security Design Principles.ppt
 Security Design Principles.ppt Security Design Principles.ppt
Security Design Principles.ppt
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 

Destacado

5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider ThreatLancope, Inc.
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasuresKAMRAN KHALID
 
Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insidersgjohansen
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection RecommendationsAlienVault
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziKashif Semple
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentationIISPEastMids
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoMatt Frowert
 
Snowden slides
Snowden slidesSnowden slides
Snowden slidesDavid West
 

Destacado (10)

5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insiders
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentation
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
 
Snowden slides
Snowden slidesSnowden slides
Snowden slides
 

Similar a Insider threat kill chain

Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2Chris Baldwin
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindThe Lorenzi Group
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftCase IQ
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 

Similar a Insider threat kill chain (20)

Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Testing
TestingTesting
Testing
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 

Último

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Último (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Insider threat kill chain

  • 1. (c) 2014 All rights reserved. Insider Threat Kill Chain 1 Insider Threat Kill Chain Detecting Human Factors of Compromise Tarun Gupta Information Security Expert email@tgupta.com
  • 2. (c) 2014 All rights reserved. Insider Threat Kill Chain 2 “Your organization’s greatest asset is also its greatest threat.” PEOPLE.
  • 3. Case Study : Insider Threat (c) 2014 All rights reserved. Insider Threat Kill Chain 3  Hosting Company; Location Confidential (NDA)  Disgruntled System Admin; No bonus for last 4 years  5000+ e-Commerce Websites Down; Holiday Season (--$$$$)  < 2 minutes and 100 characters of code  Moved Apache Config File; Service Did not re-Start Disgruntled Web Server Administrator Breaking Bad
  • 4. Research & Statistics : Insider Threat (Forrester) (c) 2014 All rights reserved. Insider Threat Kill Chain 4Source : Forrester Study “Understand the State of Data Security and Privacy. 2013” Bottom-line : Insiders carry on as a major source of data breach
  • 5. Research : Insider Threat (PWC) (c) 2014 All rights reserved. Insider Threat Kill Chain 5 Source : PWC 2013 US Cybercrime Survey Report
  • 6. Insider Threat Intentions (c) 2014 All rights reserved. Insider Threat Kill Chain 6 Intentions  Financial Gain  Career Advancement; Promotion  Revenge; Disgruntled  Thrill; Curiosity  Personal Motive  Accidental; Human Error  Political Cause (Hacktivist) THREAT = CAPABILITY x INTENT Source : CERT breakdown of Insider Threats IT Sabotage, 21% Fraud, 37% IP Theft, 15% Espionage , 19% Others, 8%
  • 7. Case Study : Insider Threat (c) 2014 All rights reserved. Insider Threat Kill Chain 7  7 May 2014 ; Nicholas Paul Knight, 27 (a.k.a. “nuclear black hat”)  Attempt to hack naval database; while on ship  Member of Hacking Group; Hacked Pentagon Earlier  Motivation : Anti-government Sentiment, Boredom and Thrill- seeking  Boasted NAVY.MIL Owned Network Admin Allegedly Hacked Navy ; While on Carrier Source : http://www.wired.com/2014/05/navy-sysadmin-hacking/
  • 8. Insider Threat Kill Chain (c) 2014 All rights reserved. Insider Threat Kill Chain 8 Recruitment/ Tipping Point Search/ Recon Acquisition/ Collection Exfiltration/ Action Timeline Prevent Detect Respond Authorized Credentials Defensive Controls Security Policies Awareness & Training Access Control Split Access Least Privilege Controls Event Logging & Review Integrity Checking Independent Auditing Mandatory Rotation Large Data Transfers Controls Backup & Recovery Process Insider Response Plan Network & System Audit Forensics Quarantine User & Systems Credential Revoke Process Indicators (Technical & Non Technical i.e. HR, Legal, Facility etc.)
  • 9. Prevent : Human Indicators of Compromise  Consistently First In & Last Out of Office (always aware & in control)  12 Month+ Unused Vacation  Lifestyle Changes (Spending, Socializing, Marital Status)  Resigned ; Serving Notice Period  Lay-Off Notification (Redundant Position)  Passed over for Promotion/ Raise  Pending Disciplinary Action or Investigation Recommended Control – Create HR Watch List
  • 10. Prevent : Awareness & Training  Consider Threats from Insiders & Partners in Risk Assessments  Background Checks (Positions of Trust & Higher Access)  Clearly Document & Enforce Policies and Controls (Code of Conduct etc.)  Periodic Security Awareness Training (Employees, Contractors, Partners)  Monitor & Respond to Suspicious or Disruptive Behavior  Anticipate & Manage Negative Workplace Issues  Secure and Track Physical Environment  Establish Clear Lines of Communication and Process between HR, Legal & IT regarding Information Security
  • 11. Prevent : Human to Machine Indicators  Increasing Number of Logins; Variation in Local/Remote  Logging into Network, Systems, Applications at Odd Times or Holidays  Logging in Frequently during Vacation Times  Remote Logging Using Different Employee Credentials  Logging from Multiple Locations (Proxy, VPN)  Changes in Websites Visit; Work vs Personal  Increased Printer/ Copier/ Scanner Usage  Export of Large Reports/Data/Downloads from Internal Systems (USB)  Executing Broad Database Queries (Select All ….)
  • 12. Prevent & Detect : Policy & Technology Controls  Implement Strict Account & Password Policy  Enforce Separation of Duties, Split Authority & Least Privilege  Extra Caution with System, Network, Application & Database Administrators  Administer and Review Privileged Users  Implement System Change Controls (Integrity Checker; Change Management Process)  Deactivate System & Network Access on Termination or Resignation  Log, Monitor & Audit Employees Network Activity
  • 13. What to Log ?  Firewall & Remote Access Logs  Unsuccessful Login Attempts  Intrusion Detection Systems (IDS/IPS) Logs  Web Proxies (Internet Gateway)  DNS Logs  Antivirus Alerts  Change Management Events (Ex. Integrity) Bare Minimum to Start
  • 14. Log Intelligence & Analytics Vulnerability Data User Activity Host & Server Activity Database Activity Application Activity Configuration Data Security Devices Physical Access Directory Compliance Reports Real-Time Correlation “Means” BIG DATA Actionable Intelligence Analytics Forensics Retention
  • 15. All Logs Considered  Determine Log Volume – Events per Second; Redundant Information  Establish Log Management Policies & Procedures – Should Include Enabling, Retention & Security of Logs; Consult Legal & Compliance – What is Collected ? – Who Manages Logging Systems ? (Segregation of Duties)  False Positives – Tune Systems; Reduce Noise  Establish a Baseline – What is Normal Behavior ? , Identify Anomalies  Accessing Information – Multiple Departments need to Access; Challenges with Log Intelligence & SIEM
  • 16. Insider Threat Response  Implement Secure Backup & Recovery Processes – Data, Configuration, Documents & Logs  Quickly Audit User’s Network & System Behavior  Quarantine User – Disconnect User from network (LAN, WAN, Remote) – Revoke Credentials – Cease Workstation, Mobile Devices & Equipment – Disable Physical Facility Access  Develop an Insider Response Plan (Inter Departmental; IT, HR) – Communication Protocol (engaging with Insider, confrontation) – Synchronize with HR Watch List, Resignation etc.
  • 17. (c) 2014 All rights reserved. Insider Threat Kill Chain 17 Thank You. DISCLAIMER The views and opinions expressed herein are those of the author and are based on best practice, research or information available in public domain. The information contained herein is of a general nature, education and professional use only and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. The information contained in the attached document is not legal advice but is rather intended to provide guidance or education use only. While every care has been taken in the preparation of the attached document you should refer to your own legal counsel for advice on your specific business requirements. Examples, values and/or sample data is indicative and by no means conclusive. It is strictly for educational and information use only. Users need to evaluate their business processes and infrastructure to define appropriate levels best suited for business needs. All brands and trademarks mentioned in document are possibly registered or protected by third parties are solely subject to the trademark and ownership rights of the registered owner. The author gives due credit to person/ organization or agency for its original work or publication.

Notas del editor

  1. The “Kill Chain” is a traditional warfare term most often used by the US Air Force in defining the command and control process for targeting and destroying enemy forces in order to make it most difficult for the enemy to continue in battle.
  2. Tipping Point – Good employee going bad, Often insiders have higher access and authorized credentials