Page 11 - Cyber Warnings August 2017
P. 11

•  Attackers do not respect org-charts. Departments are typically defined by skill-sets
                       and the need to organize work tasks. Attackers don’t care about these artificial
                       boundaries. If departments are partitioned silos which do not freely and quickly
                       exchange information, an attacker may pass through several areas of responsibility and
                       be long gone before personnel in the requisite areas can connect the dots.
                    •  Attackers do not respect the way security tools are organized. An attacker may, and
                       probably will, cross through several layers of infrastructure. Don’t expect an attack to
                       necessarily bounce the needles on your monitoring dashboard or trip an alert. The thing
                       about turning on search lights is that potential intruders avoid them. Evaluate where the
                       shadows exist in your environment. That’s where an attacker wants to be.
                    •  What are attackers trying to obtain? The answer to this question will continually
                       inform your security strategy. How often are security strategies employed which secure
                       one part of the organization while a gaping hole exists elsewhere? This is like putting a
                       sophisticated lock and alarm system on your front door at home, and then leaving the
                       back door wide open: it completely defeats the entire goal. An attacker is going to head
                       for the path of least resistance to their goal. If they can phish a secretary for the CEO’s
                       credentials and sail away in their pirate ship full of loot, why tangle with cannons?
                    •  How would you get in from the outside? The view from inside your defenses is a
                       completely different perspective from that of the outside. When locked out of your
                       house, your mind starts to work differently than it did when you were inside. While
                       inside, you view entry as a function of its intended entryways. But when locked out, you
                       think in terms of openings, whether intended or not: a vent is a window is a door. Locks
                       are no longer a function of keys, they are a function of contact points with the door
                       frame which a wire or credit card can possibly alter. The first floor is no longer the only
                       entry level: second story windows, balcony doors, or basement window wells are just as
                       sufficient. The same is true with computer security: if you haven’t tried to get into your
                       organization from the outside through unintended means, there’s a high probability you
                       don’t have a firm grasp on the possibilities.
                    •  How would you remain undetected once inside? After making an unauthorized entry
                       into your network, how would you remain undetected long term? Could you come and
                       go as you please without raising alarms? This is something that the typical penetration
                       test isn’t going to gauge, if for no other reason than time constraints. Even if you’ve
                       passed an audit with flying colors, it likely is no assurance that a future attacker couldn’t
                       camp in your environment indefinitely avoiding detection.

               Thinking like an attacker can alone go a long way to helping assess a defensive strategy. This is
               essentially what the purpose of threat modeling is – to anticipate the potential security threats
               posed to an organization. But active offensive penetration moves beyond theory into reality,
               where not only initial penetration possibilities can be validated, but impact can be assessed. It
               also gives defenses practice against an active attack.

               The following sections describe a few ways your organization can get started immediately with
               offensive exercises which will provide new insight on your security posture and help improve
               your organization’s defenses.

                    11   Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   6   7   8   9   10   11   12   13   14   15   16