BreachExchange mailing list archives
Spotting and staying ahead of the next network breach
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Fri, 2 Oct 2015 13:30:27 -0600
http://www.scmagazineuk.com/spotting-and-staying-ahead-of-the-next-network-breach/article/442180/ High-profile network security breaches have escalated dramatically in 2015. The recent assault on the Office of Personnel Management in which the personnel data of over 4.2 million US government employees was compromised is just the latest example of how both the private and public sector are susceptible to cyber-attacks. Financial services firms have become increasingly more vulnerable as the level of sophistication and ability of these attacks to evade detection has improved. In fact, a recent survey conducted by the Bank of England found that financial institutions often misdiagnose cyber-attacks as internal IT failures, leaving them vulnerable to infiltration and the loss of valuable data as a result. By not being able to properly identify these attacks when they happen, how can financial institutions hope to effectively combat them? The time has come for the financial services industry to re-evaluate their approach to network security, and to consider employing a ‘defence in depth' strategy to safeguard against both external and internal threats. In this article, we will look at how this ‘outward-in' approach to cyber-security works to expose cyber threats, and the need for financial institutions to put greater emphasis on breach detection, data capture and internal network segmentation in order to effectively implement it. Breach detection and theft mitigation
From blunt force distributed denial of service (DDoS) attacks to more
subtle and embedded approaches (ie, phishing, malware, etc), the methods and exploits employed by hackers to infiltrate financial institutions' host networks have and will continue to evolve. In order to effectively combat these threats, we first need to evaluate how they are being identified and managed. According to Gartner, global spending for cyber-security is expected to reach over US$101 billion (£60 billion) by 2018. To date, many of these institutions have prioritised and continue to invest heavily in threat prevention technology to nullify security threats at the perimeter of the network. In addition to being a more cost prohibitive approach, this approach doesn't account for cyber threats that have already breached externally focused security measures. Given how often data passes throughout a networks' sub-systems, it is imperative to have adequate hardware and software based internal security in place to monitor and protect the network. This includes comprehensive anti-virus protection, access control and authentication policies. The concept of ‘defence in depth' begins at the edge of the network, and then works its way through to the internal infrastructure, such as firewall, router, MDF switches and IDF switches. In order for this in-depth strategy to be successful, measures need to be taken to address internal threats to the system. Data capture and network performance Financial institutions need to strike a balance between intrusion and detection to not only eliminate imminent threats to critical data assets, but also to identify the source of the breach and to then take steps to mitigate the loss of data by creating barriers to prevent data loss. The best means of doing so is to implement a data packet capture solution to isolate and expose the threat. A high-performance data capture platform needs to be implemented to allocate CPU usage for core security applications as well as to maintain the performance of the network if/when the system is under attack. In addition to capturing data from ‘north and south' attack vectors, implementing data packet capture allows IT administrators to better identify internal threats to the network that have already bypassed the firewall into the heart of the data center. While packet capture will slow down these internal threats, IT administrators still need to take measures to prevent their potential spread across the network. Internal network segmentation Once the nature of the breach has been identified and the capture process has been completed, the last and arguably most crucial step in this process is to isolate customer traffic and services within multitenant cloud environments to defend against the spread of malicious code to other key segments of the network. Once the infected areas have been partitioned off, new policies, filters and access control lists can be implemented to limit access to critical data stored on the servers to only properly authenticated users. When combined with the physical layers of security that protect the server (i.e. network adapters, etc.), this effectively quarantines the areas that have been impacted by the breach, allowing day to day operations to continue normally while malicious data is excised from the server. Conclusion Financial services organisations will continue to be one of the leading targets for cyber-security attacks, and as such need to have the right processes in place in order to safeguard their mission critical business data and the data of their customers. By enacting a defence in depth approach to cyber-security, they have the unique opportunity to create cost effective security protocols that can not only detect current network breaches, but allow them to stay ahead of attempts to exfiltrate sensitive data in the future.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- Spotting and staying ahead of the next network breach Audrey McNeil (Oct 05)