Dia 1 - Surf

Transcription

Dia 1 - Surf
2
Our Mission: to keep KPN reliable & secure and trusted
by customers, partners and society
WHAT we will achieve:
• Deliver secure products & services to our customers.
HOW we will so:
6
•
Manage a security framework that ensures a 360 degree approach to mitigating
security risk to KPN’s networks and data.
•
Maintain the security processes, people and technologies required to address the
evolving security threat landscape.
•
Define the information security threats (external and internal) to KPN’s network
infrastructure and data.
•
Measure, manage, respond and remediate the security risk to KPN’s external and
internal network infrastructure and data - that is vulnerable to attack.
•
Assuring that expertise & capabilities in the area of IS & BCM are in place and up to
date.
Security
Awareness
Security
Capability
7
Visibility &
Risk
Intelligence
World of Security at KPN
CISO
CSO
Physical Security
JAM
Fraud Management
Security Helpdesk
Information Security
& Business Continuity
Management
NOC & SOC &
ABUSEDESK
Operational Security
Incident Management
GRC
Compliance to Telecom Act
RFR
BCF & GRIP
Privacy
LEGAL
Legal affairs
External Relations
CISO Organization
COO
Farwerck
CISO
Baloo
Program Coordinator
PREVENT
DETECT
Security Strategy &
Policy
•
•
•
•
Policy creation and
Maintenance
Security Posture Set
SSO Segment Reports
Classify and Monitoring
Key Programs and
Projects
RESPOND
KPN RED TEAM
•
•
•
•
•
Internal Ethical stress testing
Product Review Testing
Application Testing
Audit criteria verification testing
Portal Authority
VERIFY
SSO
CERT CC
•
•
•
•
Risk Intelligence
Threat Analysis
Incident Response and
resolution coordination
Contact point for Information
Security across KPN
Improving Security Governance and
Organisation
KPN Security Operations
KPN NL Information Security Office
CISO
Interne Security
Operations Center
Strategy & Policy
Red Team
CERT
Security Advisors
Security Advisors
Security Advisors
Externe Security
Operations Center
Abusedesk
RSD
ZM
S&I
Netco
Corp/SSO/ Ibas
Sr Security Officer
Sr Security Officer
Sr Security Officer
Sr Security Officer
Sr Security Officer
Security
Officers
1. Policy Implementation
2. Security and Continuity
Design
3. Supplier Management
4. Incident Response & Risk
Intelligence
10
Security
Officers
1. Policy Implementation
2. Security and Continuity
Design
3. Supplier Management
4. Incident Response & Risk
Intelligence
5. Client Assurance
Security
Officers
1. Policy Implementation
2. Security and Continuity
Design
3. Supplier Management
4. Incident Response & Risk
Intelligence
5. Client Assurance
Security
Officers
1. Policy Implementation
2. Security and Continuity
Design
3. Supplier Management
4. Incident Response & Risk
Intelligence
Security
Officers
1. Policy Implementation
2. Security and Continuity
Design
3. Supplier Management
4. Incident Response & Risk
Intelligence
New Security Policy Framework
Functional areas covered
01 Management
of security
a.o. risk mgt, roles
& responsibilities
02 Human
resource security
a.o. awareness,
training, screening
03 Asset
Handling
a.o. classification,
media handling
04 Physical
Security
a.o. buildings,
access control
05 System &
network security
a.o. systems,
networks, applics
06 Innovation
& development
a.o. innovation
07 Supplier
relationships
a.o. assurance,
outsourcing
08 Incident
management
a.o. reporting,
response, crisis
09 Business
continuity
a.o. planning,
exercising
10 Regulatory
compliance
JAM, privacy,
fraud mgt
Each functional
area elaborated in
specific set
of standards, rules,
guidelines and tools
11
Note: structure and terminology aligned
with new ISO/IEC 27002 (latest working
draft d.d. 11-10-2012), but tuned to KPN
context where useful/ required.
Wait – we have a process for this?
Security Incident
Incidentregistratie
Initiatiefase
Opschalen
Handelen
Operationele fase
Evalueren en
documenteren
Rapporteren
Nazorg fase
Triage
Case1 : Mgmt. quote ’’Test servers can have
lower security requirements….’’
CASE 1: 28/11/2013
1st stage – scan panic
Red Team test Q4 2013 -- Scope: 213.75.0.0/17 – Unauth - gentle
Test: Follow-up critical findings from Nessus Scan
JBoss 'EBJInvokerServlet' and 'JMXInvokerServlet‘ –> CVE 10/2013
Traffic analysis shows :12 secs of 60Mbps - Bots will sign off as soon
as they fired their 60Mb/s UDP stream.
What are these systems? Where are they? Who owns them?
17
CASE 1:
2nd stage WTF! ( Wednesday Thursday & Friday)
18
CASE 1:
In parallel to external reporting
• Temporarily disconnect the internal interfaces of the currently known 4
compromised systems and set up our system to take their IP’s and MAC’s
and connect on the same ports, mimicking the compromised hosts.
• Scan networks, hosts and map out routes & Discuss findings with admins
Check in Qualys whether a check for these vulnerabilities already exists.
CERT analyzing already monitored traffic
CERT Perform forensics on possible compromised systems.
Collect scan results for tweaking a new scan for the complete KPN outside
infrastructure to identify more JMX consoles.
19
CASE 1:
3rd stage - reporting to the NCSC
KPN-CERT Notification :: TLP-Amber
20
Guest Hacker Program - learn from the best
22
20 min 1 idea
23
Weekly Risk Intel – for Top Mgmt & Rest of KPN
Goedenavond Joost,
Dit is jouw wekelijks Risk Intel
CLASSIFIED
UNCLASSIFIED
24
Working together with the Authorities
An example : Cyberpaint
25
Reality Checks :
Benchmark with others, esp Telcos :
With other Ethical Hackers:
Keep Checking on our ability to do Good with Key Security Indicatiors
26
Why Silent Circle?
Protecting my board
Security is a journey – NOT a destination
Know Thyself and Thy network
Develop awareness and keep doing it // NON CONVENTIONALLY
Who can’t find what you’re not looking for so keep review cycles for
monitoring and intel gathering – find your friends to share intel
Develop capability and keep improving it -Continuous improvement
cycle
Get a reality check – its healthy
28
Bonus slides for extra credit
29
Titel van de presentatie
Classificatie
EU – Cyber Security Strategy
• Software and hardware manufacturers - currently
excluded from the scope of the Directive
Data Retention
"by requiring the retention of those data and by allowing the competent national
authorities to access those data, the directive interferes in a particularly serious
manner with the fundamental rights to respect for private life and to the protection of
personal data."
"Furthermore, the fact that data are retained and subsequently used without the
subscriber or registered user being informed is likely to generate in the persons
concerned a feeling that their private lives are the subject of constant surveillance,"
NL - Wetsvoorstel Cybercriminalitiet
• Hack Back
• Allowed use of exploits;
spyware ; etc
• Hack Inside and
Outside NL
• Automated Device –
open definition
• Decryption Order
PGP ; TOR ; Tails ;
Why can’t Johnny encrypt?