Wednesday, September 3, 2014

Documenting Privilege – PCI-DSSv3

Yes, I understand the importance of Requirement 7. Restrict access to cardholder data by business need to know.

Increasingly, my respect grows for peers that communicate in plain English. Why? Because I understand how well you must understand material to [1] discuss it vs. [2] discuss it plainly.

Several years ago I was listening to a public radio tribute for a great Nobel prize-winning physicist. He had recently passed away, and his mark on society wasn't just his great research. It was his ability to plainly explain complex concepts in a way that people understood, and in a way that excited people. Creative passion. Made people want to understand and know even more. He made physics accessible to the average person.

Like many of you, I'm asked to understand a wide variety of topics. That means that I'm often coming back to topics that I've worked with before, and noticing new things.

As an example, requirement 1.1.5 is nicely done:
  • Requirement 1.1.5
    • Description of groups, roles, and responsibilities for management of network components
  • Testing Procedure
    • 1.1.5.a Verify that firewall and router configuration standards include a description of groups, roles, and responsibilities for management of network components. 
    • 1.1.5.b Interview personnel responsible for management of network components to confirm that roles and responsibilities are assigned as documented.
  • Guidance
    • This description of roles and assignment of responsibilities ensures that personnel are aware of who is responsible for the security of all network components, and that those assigned to manage components are aware of their responsibilities. If roles and responsibilities are not formally assigned, devices could be left unmanaged. 
  • Plain English: Validate everything is managed.… No device left behind… 
 
Now here's an example of much-needed simplification with respect to roles. The extended original version is fine if you work with this every day. But if you don't, I believe it's incredibly important to keep it simple. I think it would be a fun exercise to see how short and direct you could make the PCI-DSS.
 
Plain English version:
  • Plain English: 7.1.1 – Validate privileges following least privilege rule are documented.
  • Plain English: 7.1.2 – Validate privileges are appropriate with management.
  • plain English: 7.1.3 – Validate process exists whereby users are correctly assigned.
  • Plain English: 7.1.4 – Validate access approvals are documented.
 Extended playlist:

7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access.
7.1  Examine written policy for access control, and verify that the policy incorporates 7.1.1 through 7.1.4 as follows:
·    Defining access needs and privilege assignments for each role
·    Restriction of access to privileged user IDs to least privileges necessary to perform job responsibilities
·    Assignment of access based on individual personnel’s job classification and function
·    Documented approval (electronically or in writing) by authorized parties for all access, including listing of specific privileges approved.
The more people who have access to cardholder data, the more risk there is that a user’s account will be used maliciously. Limiting access to those with a legitimate business reason for the access helps an organization prevent mishandling of cardholder data through inexperience or malice.
7.1.1  Define access needs for each role, including:
·    System components and data resources that each role needs to access for their job function
·    Level of privilege required (for example, user, administrator, etc.) for accessing resources.
7.1.1  Select a sample of roles and verify access needs for each role are defined and include:
·    System components and data resources that each role needs to access for their job function
·    Identification of privilege necessary for each role to perform their job function.
In order to limit access to cardholder data to only those individuals who need such access, first it is necessary to define access needs for each role (for example, system administrator, call center personnel, store clerk), the systems/devices/data each role needs access to, and the level of privilege each role needs to effectively perform assigned tasks. Once roles and corresponding access needs are defined, individuals can be granted access accordingly.
7.1.2 Restrict access to privileged user IDs to least privileges necessary to perform job responsibilities.
7.1.2.a  Interview personnel responsible for assigning access to verify that access to privileged user IDs is:
·    Assigned only to roles that specifically require such privileged access
·    Restricted to least privileges necessary to perform job responsibilities.
When assigning privileged IDs, it is important to assign individuals only the privileges they need to perform their job (the “least privileges”). For example, the database administrator or backup administrator should not be assigned the same privileges as the overall systems administrator.

 
7.1.2.b   Select a sample of user IDs with privileged access and interview responsible management personnel to verify that privileges assigned are:
·    Necessary for that individual’s job function
·    Restricted to least privileges necessary to perform job responsibilities.
Assigning least privileges helps prevent users without sufficient knowledge about the application from incorrectly or accidentally changing application configuration or altering its security settings.
Enforcing least privilege also helps to minimize the scope of damage if an unauthorized person gains access to a user ID.
7.1.3 Assign access based on individual personnel’s job classification and function.
7.1.3 Select a sample of user IDs and interview responsible management personnel to verify that privileges assigned are based on that individual’s job classification and function.
Once needs are defined for user roles (per PCI DSS requirement 7.1.1), it is easy to grant individuals access according to their job classification and function by using the already-created roles.
7.1.4 Require documented approval by authorized parties specifying required privileges.
7.1.4  Select a sample of user IDs and compare with documented approvals to verify that:
·    Documented approval exists for the assigned privileges
·    The approval was by authorized parties
·    That specified privileges match the roles assigned to the individual.
Documented approval (for example, in writing or electronically) assures that those with access and privileges are known and authorized by management, and that their access is necessary for their job function.

  

Tuesday, July 29, 2014

CPNI 20 Critical Security Controls

Extremely well done. These are published by the UK Centre for the Protection of National Infrastructure (CPNI).

Overview: http://www.cpni.gov.uk/advice/cyber/Critical-controls
Direct: http://www.cpni.gov.uk/documents/publications/2014/2014-04-11-critical-security-controls.pdf

Article Summary
The Critical Security Controls for cyber defence are a baseline of high-priority information security measures and controls that can be applied across an organisation in order to improve its cyber defence. CPNI is participating in an international government-industry effort to promote the Critical Security Controls for computer and network security. The development of these controls is being coordinated by the Council on CyberSecurity website.

Critical Security Controls guidance
CSC 1: Inventory of Authorized and Unauthorized Devices
CSC 2: Inventory of Authorized and Unauthorized Software 
CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 
CSC 4: Continuous Vulnerability Assessment and Remediation 
CSC 5: Malware Defenses 
CSC 6: Application Software Security
CSC 7: Wireless Access Control
CSC 8: Data Recovery Capability
CSC 9: Security Skills Assessment and Appropriate Training to Fill Gaps 
CSC 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches 
CSC 11: Limitation and Control of Network Ports, Protocols, and Services 
CSC 12: Controlled Use of Administrative Privileges 
CSC 13: Boundary Defense
CSC 14: Maintenance, Monitoring, and Analysis of Audit Logs 
CSC 15: Controlled Access Based on the Need to Know
CSC 16: Account Monitoring and Control 
CSC 17: Data Protection 
CSC 18: Incident Response and Management 
CSC 19: Secure Network Engineering
CSC 20: Penetration Tests and Red Team Exercises

Unrelated......
Also found this while researching new information for a class. Session title is When Controls Fail.
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Wednesday, April 2, 2014

Thursday, March 6, 2014

Elizabeth Martin System Hardening Rant.......

Interesting rant from Elizabeth Martin. I'm a new fan!


[EM]: "I went off on a bit of a rant today about hardening. In the interest of disclaimers, I would like to make it abundantly clear that I was raised in a world where *hardening is king*. If you didn't harden you were compromised very quickly. Unfortunately it is now at least 10 years later if not more and still very few, if any, systems are hardened.

Of course I asked the twitters and frankly they did not give me the answers I sought. I was looking for answers such as "Of course we harden our systems." or, "Naturally most of the clients I work with harden their external systems." Well I didn't get those answers. The best I got was "I am just happy if they patch." .... [ouch.]

Awesome Comparison of Risk Methodologies


Absolutely love this research from Gartner. Fantastic job guys.
You Care Because: There are several viable risk management frameworks our customers can use for assessing and building security into Vblock Systems. The program is far less important than the execution. There are several similar sports, business, and personal analogies.  

Gartner For Technical Professionals - Comparing Methodologies for IT Risk Assessment and Analysis       

Authors: Ben Tomhave, Erik T. Heidt & Anne Elizabeth Robins

To access this research, visit www.gartner.com.

In-Scope Methods:

  • FAIR
  • ISACA COBIT 5
  • ISF IRAM
  • ISO/IEC 31000:2009 and 27005:2011
  • MAGERIT
  • NIST Special Publication 800-30
  • OCTAVE Allegro
  • RiskSafe 

Summary of Findings (page 3)

Bottom Line: Which method you choose for IT risk assessment and risk analysis is far less important than ensuring that the selected methodology is operationalized and a good fit for the corporate culture. It is more important to start somewhere, getting a process in place that integrates with existing or emerging risk management processes, and then scaling and evolving practices over time. The selected approach must be able to produce output that is meaningful to management, and supporting processes must account for assumptions, documentation and potential gaming of the system. Tools should be leveraged, where possible, to ease method adoption.

 

Tuesday, February 18, 2014

Cisco 2014 Annual Security Report - An Erosion of Trust


Get the report here: http://www.cisco.com/web/offers/lp/2014-annual-security-report/index.html 
 
Selected highlights:
  • 100 percent of companies have systems calling malicious malware hosts. Investigations of multinational companies show evidence of internal compromise. Suspicious traffic is emanating from their networks and attempting to connect to questionable sites.
  • Threats grow: 14 percent year over year – new alerts
  • Market verticals: The rate of malware goes up or down as the value of a particular vertical’s goods and services rises or declines.
  • 37 billion “intelligent things” connected to the Internet by 2020.
  • Old blogs and idle domains: Millions of abandoned blogs and purchased domains sitting idle, and many of them are probably now owned by cybercriminals. Cisco security experts predict the problem will only worsen as more and more people in emerging Internet markets around the globe establish a blog or a website, only to let it languish later.
  • Making noise: DDoS attacks are increasingly being used to conceal other nefarious activity, such as wire fraud before, during, or after a campaign
  • Talent shortage: It’s estimated that by 2014, the industry will still be short more than a million security professionals across the globe.
  • Cloud computing: For smaller organizations or those with budget constraints, a well-protected and well-managed cloud service can offer more security safeguards than a business’s own servers and firewalls.
  • Security Objectives for 2014: Verifying Trustworthiness and Improving Visibility
Special note for Java:
  • 76 percent of enterprises using Cisco solutions are also using the Java 6 Runtime Environment, in addition to Java 7. Java 6 is a previous version that has reached its end of life and is no longer supported.
  • Java comprises 91 percent of web exploits.
  • 97 percent of enterprise desktops run Java
Impressive statistics – Cisco evaluates:
  • 16 billion web requests are inspected daily through Cisco Cloud Web Security
  • 93 billion emails are inspected daily by Cisco’s hosted email solution
  • 200,000 IP addresses are evaluated daily
  • 400,000 malware samples are evaluated daily

Monday, December 23, 2013

Upcoming Security Conferences

Coming off of an awesome time freezing in the cold night around a large fire pit, eating brisket with friends at David Cowen's home. Called man night, it's a time for a bunch of old hacks to tell stories of early day phone phreaking, ISP hacking, and other stuff that was usually benign and flat-out funny. Thrown in the mix, stories of partying and playing pranks at early hacker conferences. Just a fantastic group of guys.

So…  This jumped out at me while reviewing the weekly Cisco Cyber Risk Report. Here is a list of upcoming (larger) conferences that may be of interest:
  • SHMOOCON 2014: January 17–19, 2014
  • Cisco Live Milan: January 27–31, 2014
  • RSA Conference USA 2014: February 24–28, 2014
  • Cisco Live Melbourne: March 18–21, 2014
  • Black Hat Asia: March 25–28, 2014
  • Infosecurity Europe: April 29–May 1, 2014
  • Cisco Live 2014: May 18–22, 2014

Friday, July 19, 2013

Prioritizing Outlook Email with Colors

Reading Scott Lowe's blog post titled Reducing the Friction: Processing Email... Like many of you, I have found increasing value in efficiency because it fosters work-life balance. I do everything possible to remain focused and efficient during the day so that I can leave work at work. This is especially true because I remain involved in teaching, speaking, and writing outside of work as well. Automatically coloring email according to where my name is addressed helps me with processing email.
  • 1st Priority: BLUE – To: You (Email sent directly to you with nobody else on the To: line) Somebody likely expects you to respond…
  • 2nd Priority: TEAL – To: You, Others (Email sent directly to you with other people on the To: line) Somebody wants you to know, possibly respond…
  • 3rd Priority: MAROON – Cc: You (Email copied to you) Somebody wants you to keep you informed, possibly comment..
Here’s how to do this:
  1. Add conditional formatting rules:
    From the inbox, right-click From | click view settings | conditional formatting
  2. Add the rules:
    Add | choose name | click font | change color | select OK | choose Condition | select checkbox Where I am: | choose appropriate drop-down selection | select OK | add more conditions as needed…

Wednesday, June 12, 2013

Building Ninjas: Video Demos

Someone asked about hacking demonstrations… Reminded me of these 2 websites that are fantastic to get information about relatively current products and techniques. The other obvious choice is of course www.YouTube.com:).

http://demosondemand.com