Wolfpack 2016 Cyber Security Guide

Share Embed Donate


Short Description

cy...

Description

CYBER SECURITY GUIDE 2016 WOLFPACK INFORMATION RISK

RESEARCH | THREAT INTELLIGENCE | ADVISORY | TRAINING AWARENESS | MONITORING |

TALENT MANAGEMENT

www.wolfpackrisk.com

Contents

 INTRODUCTION





Introduction Approach



Cyberwolf Cartoon - Reconnaissance

ASSESS - Health Check Phase



Stakeholder Engagement – Setting the scene Cyberwolf Cartoon - Infiltration



4



ISMS: DO Phase

17

5



ISMS: CHECK & ACT Phase

17

7



Simulated Red and Blue Team Exercises

18



Information Security & Privacy Incident Management

19



Cyberwolf Cartoon - Spear Phished

21



Information Security Programme

22



Awareness



Training Programme

8



8 9

Health Check – Determine the Current State



 IMPROVE

10

24

Training Courses



25

Conduct an Information Risk Assessment



Conduct a Cyber Risk Analysis



Define a Priority Road map

12





Cyberwolf Cartoon - Revenge

13



MONITOR – Threat Monitoring Phase

27



Cyberwolf Cartoon - Command and Control

28

About Wolfpack Information Risk

29







IMPROVE - Remediation Phase

14



Define an Information Risk Management Framework

15



Establish an Information Security Management System

15



ISMS: PLAN Phase

15



Cyberwolf Cartoon - Compromise

16

 IMPROVE





Cyberwolf Cartoon - Ransomware



26

11



1

23



ASSESS

10





MONITOR

28

Professional Service Offering



30

Introduction



Cyberspace is where online communication happens

Introduction

 INTRODUCTION

Any organisation today faces a constant challenge in preserving the confidentiality, integrity and availability of its information assets, against the broad range of external and internal threats. The failure to take a proactive approach to information risk management is leaving many organisations vulnerable with potentially devastating consequences. We have on many occasions seen how organisations are battling to. establish a business-aligned, risk-based cyber security programme that can adapt to a constantly changing regulatory, customer, and threat environment.

It is the interconnection of humans through technology, without regard to physical geography.

Wolfpack have over the years established an approach that will: • • • •

Cyber security is the preservation of confidentiality, integrity and availability of information in cyberspace

Provide you with the highest return on investment (ROI) for your information security spend. Protect your organisation from a large majority of threats thereby reducing risk. Demonstrate a proactive posture to safeguard critical assets. Elevate security from an operational function to a strategic business enabler.

(ISO 27032) 1

4



Approach



 INTRODUCTION

This document outlines our approach to:

 ASSESS

E

ME

DI

I AT

N,

SIM

UL

IM AT ED

SO

RY

AR N G & AW

RE

O

SS

AD

PROV

AT TA C

VI

E

K S & IN CI D E N T RE S P

ESS ASS

E NC

AINI

NE

 IMPROVE



• ON

SE

MONITOR

5





 1

• •

T & CYBER RIS KA SMEN N SES A LY AS SIS SK RI

REAT INTELLI GE TH

TR

THREAT &V UL NE RA BI

T LI

INF OR MA TIO



N

MO NI

R TO Y

MENT AGE N MA



• •

Identify the specific information threats facing your business environment. Validate acceptable information risk levels in accordance with business requirements. Determine the maturity of existing information risk, people, process and technology controls across the areas within scope. Highlight key vulnerabilities and risk areas across the organisation.

Define a suggested improvement priority road map for the establishment of an Information Risk Management Framework and an Information Security Management System (ISMS) in accordance with ISO 27001:2013 specifications. Performing realistic threat testing to ensure the controls are effective. Ensure a robust incident management programme is in place. Provide a training and awareness programme to transfer skills. Correlate and analyse event data. Determine suspicious network behaviour, conduct active network scanning and respond to threats more effectively.

6

Reconnaissance



ASSESS - Health Check Phase

 ASSESS

Stakeholder Engagement ASSESS Health Check Phase

Information Risk Assessment

Priority Roadmap

A workshop is conducted with senior management and operations to reinforce the importance of information risk management and ensure all stakeholders understand their roles and responsibilities in the upcoming health check. 400 vulnerabilities reviewed across 14 key domains

Cyber Risk Analysis

Deep technical monitoring exercise to identify cyber risks

Following a rigorous analysis of the assessment results and management concerns, an improvement roadmap is agreed upon to address high priority risks.

Stakeholder Engagement – Setting the scene An information risk workshop will be conducted with key stakeholders in the organisation to highlight major threats facing the organisation, to reinforce the importance of information risk management and ensure all stakeholder teams understand their roles and responsibilities in the upcoming assessment. This will improve the accuracy of responses from all applicable sections within scope of the assessment and encourage open dialogue in order to highlight all major vulnerabilities within the Technology organisation.

Technology

Communication

Inadequate capacity

Unencrypted communication

Poor siting of equipment

Inadequate bandwidth

Insufficient software testing

Diagnostic ports active

Lack of documentation

Weak wifi security

Organisation Inadequate management oversight

Weak change management

Unstable power supply

No procedure to report weaknesses

Poor physical security

Poor log management

Lack of regular audits

SLAs not monitored

  1

7

Process

8

People Poor screening Shortage of key skills Lack of awareness Insufficient monitoring

Infiltration

Health Check – Determine the Current State

 ASSESS

Technical review covers asset discovery, vulnerability management, threat analysis and anomalous behaviour

400 vulnerabilities are reviewed in interviews with strategic and tactical teams

Cyber Risk Analysis

Information Risk Assessment

Open Source Intelligence (OSINT) and community threat intelligence reviews are conducted

Our health check also factors in concerns raised by stakeholders, audit findings and past incidents

Conduct an Information Risk Assessment Our proposal intends to review your current capability to provide assurance to senior management that relevant Information Risk requirements are being managed effectively. We will determine the maturity of your Information Risk capability through the review of existing Information Security, IT Governance and Privacy processes. We propose performing an assessment against a consolidated set of baseline controls from a range of best practices, international standards and legal requirements.

It is recommended the assessment includes members from Strategic (CLevel) , Management and Operational levels to ensure the correct balance of IT governance, business continuity, information security, privacy and cyber security controls are in place.

1

9

10

Define a Priority Road Map

Conduct a Cyber Risk Analysis

 ASSESS

Wolfpack will help determine your current cyber risk status by running simulated threats against different aspects of your environment. Although the threat simulations are passive, they will present data using realistic potential events. This includes IP reputational data from the Open Threat Exchange (OTX) collaboration platform. These simulations identify activity from known threat actors across the globe, including advanced persistent threats.

Simulated threats include: • • • • • •

Network and port scanning. Suspicious database activity. Scans against web services. Brute force attacks. Open Source Intelligence (OSINT) gathering. Other simulations.

TR AC KC O

3

INTERNAL

EXTERNAL

1

T EN R

PO

EP

NT

LO YM

IDE ES

NS

E

MAN

AGE THREATS

20

25

30

Risk 1

4

8

12

16

20

24

Risk 2

3

6

9

12

15

18

Risk 3

2

4

6

8

10

12

Risk 4

1

Mar

Apr

May

S FA

T

D

Active Network Scanning Passive Network Monitoring Asset Inventory Software Inventory

4

5

6

3

4

5

Business Impact

• Business operations impact

(The potential negative impact on the achievement of the objectives of the Organisation).

Vulnerabilities Network Vulnerability Testing Continuous Vulnerability Monitoring

(The potential financial loss that could be suffered by the Organisation as a result of the risk materialising).

• Reputational impact

(The potential negative impact on the reputation / image / credibility of the Organisation).

• National impact multi-disciplinary approach for preparedness, oversight and execution.”

11

3 2

• Financial impact

“Cyber security is more than an IT issue – it requires a

1

2 1

Asset Discovery

PR O

INC

Network IDS Host IDS File Integrity Monitoring (FIM) Reporting and Alarms

15

Feb

The following will be considered as part of the risk impact rating scale:

2

Threats

10

Jan

Risk 6

E TIV AC

Network Analysis Service Availability Full Packet Capture Log Management Event Correlation

E NC IA PL M

5

Priorities

Risk 5

FLEXIBLE

Behavioral

The information risk assessment and cyber risk analysis results will be reviewed in consultation with management, and a priority road map established to address high impact risks.

(The potential negative impact on the critical information infrastructure of the Country).

12

Revenge





IMPROVE - Remediation Phase

IMPROVE

ASSESS

IMPROVE Remediation Phase

Information Risk Framework & ISMS

An information risk management framework and information security management system (ISMS) aligned to ISO 27001 specifications is implemented.

Simulated Red & Blue Team Exercises

We run a number of information & cyber security simulations to help clients test their security against real-world threats and high-profile attacks.

Incident Response

We establish a comprehensive information security & privacy incident management capability based on ISO 27035. Training and testing is included.

Business Benefits & Continual Improvement Phase

We provide a combination of managed services, “battle-hardened” methods as well as training and awareness to help remediate vulnerabilities and accelerate the implementation of ISMS deliverables. This will ensure that project momentum is maintained and cross-skilling occurs within all applicable sectors of the organisation.

“There’s no silver bullet solution with cyber security - a layered defence covering the full spectrum of prevention, detection, incident response and business resilience is the only viable option”

1

13

14



Define an Information Risk Management Framework



Compromise

 IMPROVE

The information risk management framework provides an interactive dashboard to ensure that high priority risks are identified and allocated resources according to business priority. BUSINESS (Strategic)

GOVERNANCE Executive Board Committee

Governance, Risk & Compliance

Organisational Objectives

Audit & Assurance

Business Continuity

Innovation

Programme & Project Requirements

Enterprise Risk Committee Compliance Committee

IR Steering Committee Programme / Project Office Committee

INFORMATION RISK MANAGEMENT (Tactical ) Governance & Risk Management

Legal & Compliance

Human Resource & Supplier Mngt

Asset Management

Physical & Environmental Security

Security Architecture & Design

Access Control

Telecoms & Networking

Software Development & Acquisition

Cryptography

Operations Security

Incident Mngt, BCM & DR

Performance Metrics & Incentives

IT & OPERATIONS MANAGEMENT

IT Governance Council HR / Communications / Training Procurement / Supplier Management Change Management Committee

IT Operations

Capacity Management

IT Incident Management

Problem Management

Facilities Management

HR Processes

Physical Security

Infrastructure Security

Application Security

Release Management

IT Vulnerability Management

Performance Management

Third Party Management

Service Level Management

Change Management

IT Service Continuity Management

Configuration Management

Service Desk

Event Management

Information & Asset Management

Systems Management

Establish an Information Security Management System

A business-aligned ISMS is an essential vehicle to implement the necessary information security controls to address risks identified in the health check phase.

ISMS: PLAN Phase • • • •

Review of ISMS and current state of documents: Validate scope – To ensure the ISMS scope supports business objectives, audit, compliance, risk, governance & technology requirements. ISMS Gap Analysis - to identify and ensure key information assets are protected. Policy Management – Review and updating of relevant information security policies and standards. Information Risk Management – Review of information risk assessment methodology.



1

15

16



Information Security Management System (ISMS)



Simulated Red and Blue Team Exercises

 IMPROVE

ISMS Do Phase

Ensure that vital building blocks are in place when implementing the ISMS:

Wolfpack offers a full information & cyber security threat assessment testing programme to help clients protect against evolving cyber security threats and advanced persistent threat (APT) attacks.

• • • • • •

The full portfolio of solutions assesses cyber threats, understands defensive capabilities and actively tests an organisation’s battle readiness through various simulated attacks such as phishing, social engineering, unauthorised devices, vulnerability scanning and more. These assessment services help organisations understand risks and take immediate action to strengthen information & cyber security defences, processes and procedures.

• •

ISMS Scope. ISMS Manual. Risk Management. Business Impact Analysis. Statement of Applicability. Awareness & Training Programmes – Design a skills transfer programme to ensure sustainability. Incident Management – Implement an incident management programme. Management Review of ISMS – Ensure that adequate senior management review sessions are taking place.

ISMS: CHECK & ACT Phase Review & improve the ISMS: • • •

1

PARTNERS • • •

ISMS Internal Audit – Ensure an internal audit review of the ISMS against ISO27001:2013. Determine organisation’s appetite for ISO27001:2013 certification. If so assist with: Stage 1 /2 Audit - Finalise logistics with external auditor for stage 1 audit.

17

Global Local Internal

PEOPLE

PROCESSES

CONTROLS

• • • •

VULNERABILITIES (Technology / Communications / Process / People)

Management Staff IT Contractors

PROCESSES

CONTROLS

CUSTOMERS • • •

Global Local Internal

THREAT INTELLIGENCE

(Threat Actors / Internal Sources / External Sources)

18

Information Security & Privacy Incident Management

 IMPROVE

Information security policies or controls alone will not guarantee total protection of information, information systems, services or networks. After controls have been implemented, residual vulnerabilities are likely to remain that can reduce the effectiveness of information security and facilitate the occurrence of information security incidents. This can potentially have direct and indirect adverse impacts on an organisation's business operations. Furthermore, it is inevitable that new instances of previously unidentified threats will occur. Wolfpack offers a full information security & privacy incident management approach based on ISO 27035 along with on-site training to assist organisations to mitigate the impact of incidents in their environment.

INFORMATION SECURITY INCIDENT MANAGEMENT



PLAN AND PREPARE

DETECTION AND REPORTING

Information Security Incident Management Policy Policy Gap Analysis Establishment of IRT Incident Management Awareness Plan Information Security Incident Management Plan

Situational Awareness information

ASSESSMENT AND DECISION

How to Respond

LESSONS LEARNT Lessons Learnt

Event Assessment

Monitor Systems and Networks

Info Security Improvements

How to Contain Incidents

Assessment Improvements

Detecting and Alerting Collection of Security Event Reports

RESPONSES

Recovery Incident Determination

Report Events

Management Plan Improvements Resolution and Closure

IRT Evaluation

“Security is a business issue, not a technical issue.” -T. Glaessner

Insufficient preparation by an organisation to deal with such incidents will make any response less effective, and increase the degree of potential adverse business impact. Therefore, it is essential for any organisation desiring a strong information security programme to have a structured and planned approach to: • • • •

1

19

Detect, report and assess information security incidents. Respond to information security incidents, including the activation of appropriate controls to prevent, reduce, and recover from impacts. Report information security vulnerabilities, so they can be assessed and dealt with appropriately. Learn from information security incidents and vulnerabilities, institute preventive controls, and make improvements to the overall approach to information security incident management.

20

Spear Phished

Information Security Programme

 IMPROVE

Information protection is a human capital issue. A large majority of breaches are due to human involvement, not a lack of technology protection. Culture plays a huge role in setting the standards for behaviour throughout an organisation, starting with buy-in from senior management. Wolfpack provides a full turnkey awareness solution that includes business needs analysis, content development and customisation, programme management, an intuitive learning management system, as well as various human vulnerability tests conducted using our online threat platform Camo Wolf.

Exec

Stakeholder Change Management

Management

Tailored Awareness Programme with Professional Content

1

21

Users & Third Parties

22

Awareness

Training Programme

 IMPROVE

Review our Awareness Premium Pack: An annual license with access to the following content: • • • • • • • •

15 animated awareness videos (10 security / 5 privacy). 15 posters. 10 screen savers. 10 cartoons. 4 web simulations. Cybercrime survival guide. Awareness programme management toolkit. Easy policy communicator with associated induction training slides in Microsoft Power point.

Note – The annual fee covers all new content or upgrades within your licence year. Grey Wolf Learning Management System (LMS) • • • •

A powerful LMS to run your animated videos. Includes a set of questions per video that can be used to track compliance. LMS can be configured to include training for other departments in your organisation. Initial fee covers installation, configuration to client requirements and a training session for local admin staff.

Companies urgently need to develop in-house skills to ensure they can prevent, detect and respond to the increase in information threats. The Wolfpack Cyber Academy offers over 20 courses in Risk Management, IT Governance, Information Security, Cyber Security and a range of other complimentary areas. We have furthermore developed the Information Risk Baseline Programme which directly aligns to their Information Risk Methodology and is a cost effective way to train up teams within any organisation or industry.

1.1 Executive / Management (1 hour)

1. INFORMATION RISK BASELINE PROGRAMME

1.2 GRC / IS / IT teams (1-2 days)

2. SPECIALIST PROGRAMMES

1.3 User Awareness Programme (1 - 4 hours)

Let us not look back in anger, nor forward in fear, but around in awareness. - James Thurber

1

23

24

2.1 Governance, Risk & Compliance Programme

2.4 Vulnerability Management Programme

2.2 Information Security Programme

2.5 Security Operations Programme

2.3 Privacy & Incident Management Programme

2.6 Secure Development Programme

Wolfpack Cyber Academy Training Courses Wolfpack Cyber Academy Courses

Ransomware





Duration 2 DAYS

IMPROVE

Course Foundation Wolfpack Security Baseline Training – Over 14 information and cyber security domains

3 DAYS

are covered in this comprehensive course. COBIT 5 Foundation - Forms a maturity model which will provide a wealth of insight and understanding on practical issues of IT Governance.

2 DAYS

ISO 27001 Foundation - Learn about the best practices for implementing and managing

2 DAYS 2 DAYS 2 DAYS

an Information Security Management System (ISMS). ISO 22301:2010 BCM Foundation - Learn about the best practices for implementing and managing a Business Continuity Management System (BCMS). ISO 31000 Risk Foundation - Learn about the best practices in Risk Management and the essential concepts and processes that are considered most effective in risk management ISO 27005 IT Risk Foundation - Learn about the best practices in risk management and understanding how different parts of a risk management program and the implementation stages of an optimal risk assessment are synchronised

Intermediate

5 DAYS 5 DAYS 5 DAYS 5 DAYS 2 DAYS 2 DAYS 2 DAYS

CompTIA Security+ - A vendor neutral credential and internationally recognised validation

of foundation level security skills and knowledge. Certified Cyber Security First Responder – This course introduces the strategies, frameworks, methodologies and tools, which are used to manage cybersecurity risks and identify various types of common threats. ISO 27001:2013 Lead Implementer - Develop the necessary expertise to support an organisation in implementing and managing an Information Security Management System (ISMS). ISO 22301:2010 BCM Lead Implementer - Develop the necessary expertise to support an organisation in implementing and managing a Business Continuity Management System (BCMS). ISO 31010 Risk Assessment Techniques - The ISO/IEC 31010 Standard is a supporting standard for ISO 31000 Risk Management. It provides guidance on the selection and application of systematic techniques for Risk Assessment. ISO 31000:2009 Risk Manager - Develop the competence to master a model for implementing risk management processes throughout your organisation. ISO 27005:2011 IT Risk Manager - Develops the competence to master the basic risk management elements related to all assets of relevance for information security.

Advanced 5 DAYS 4 DAYS 5 DAYS

1

CompTIA CASP - A vendor neutral credential and an internationally targeted validation of advanced-level security skills and knowledge. CISM Exam Prep Course - This uniquely management-focused certification ensures holders understand business, and know how to manage and adapt technology to their enterprise and industry. ISO 27001 Lead Auditor - Develop the necessary expertise to audit an Information Security Management System (ISMS), as well as to manage a team of auditors by applying widely recognised audit principles, procedures and techniques.

WOLFPACK CYBER ACADEMY

25

+27 11 794 7322

[email protected]

26

MONITOR – Threat Monitoring Phase



Command and Control



MONITOR

The Wolfpack Monitoring platform provides five essential security capabilities in a single managed service. Understanding the sensitive nature of IT environments, we include active, passive and host-based technologies so that you can maintain the requirements of your particular environment.

Asset Discovery • • • •

Active Network Scanning. Passive Network Monitoring. Asset Inventory. Software Inventory.

Vulnerability Assessment • •

Network Vulnerability Testing. Continuous Vulnerability Monitoring.

Threat Detection • • •

Network Intrusion Detection System (IDS). Host IDS. File Integrity Monitoring (FIM).

Behavioral Monitoring • • •

Netflow Analysis. Service Availability Monitoring. Full packet capture.

Security Intelligence • • • •

Log Management. Event Correlation. Incident Response. Reporting and Alarms.

“Connecting your organisation to the Internet makes it vulnerable to the full spectrum of global threats. Without constant monitoring you have no way of knowing where you have been compromised!”

1

27

28

Professional Service Offering

About Wolfpack Information Risk

We are a specialist cyber security services company Research - Cyber security research into national security vulnerabilities

Wolfpack is a privately owned company. We are respected for our dynamic, independent thought leadership in the information and cyber security domains. We undertake a number of pro bono projects each year to improve cyber threat collaboration with a cyber community of over 9,000 stakeholders on the African continent.

Threat Intelligence – Local insight into strategic and operational cyber threats facing Africa

Who do we work with? We partner with local and international governments, organisations, industry bodies and individuals.

Advisory – Business aligned security and privacy professional services

What do we do? CONFIDENTIAL

We specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

[email protected]

Inbox (6) Outbox Drafts Sent

Established in 2011

5 New National Projects in 2016

Monitoring – Cyber Threat Intelligence Centre offering threat and vulnerability monitoring

TV / Radio Interviews

Monitoring Talent Management

9000+ Cyber Community

Core Team 22

30+

Print / Online Interviews

National Research

Conference / Event Talks

29

Training – Tailored training programmes to ensure optimal skills-transfer

Level 1 BBBEE

Awareness Training

1

Sign out



Research & Threat Intelligence Advisory

Awareness – Establish a strong security-aware culture from the top to the bottom

60+ 90+

Threat Intel Reports



Talent Management – Talent solutions to attract, assess and retain scarce skills

30

RESEARCH | THREAT INTELLIGENCE | ADVISORY | TRAINING AWARENESS | MONITORING | TALENT MANAGEMENT

WE SPECIALISE IN CYBER SECURITY

DI

I AT

,S

IM

UL

IM AT ED

SO

E

ME

1

RY

AR N G & AW

RE

ON

SS

AD

PROV

AT TA C

VI

E

K S & IN CI D E N T RE S P

www.wolfpackrisk.com

|

ON

ESS ASS

E NC

AINI NE

T & CYBER RIS KA SMEN N SES AL AS YS SK IS RI

REAT INTELLI GE TH

TR

THREAT &V UL NE RA BI

T LI

INF OR MA TIO N

MO NI

R NAGEMENT O T Y MA

SE

[email protected]

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF