SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
IBM Security                                                                                     White Paper Executive Summary




                                                     Stay ahead of insider
                                                     threats with predictive,
                                                     intelligent security
                                                     Identifying and mitigating insider threats in the age of
                                                     big data


                                                     Today organizations are faced with protecting data and applications
                                                     against external and internal threats across a complex security landscape.
               Contents
                                                     According to the Kroll Annual Global Fraud Report, a recent survey that
                1 The evolution of insider threats   polled more than 1,200 senior executives worldwide, 2011 figures show
                                                     that 60 percent of frauds are committed by insiders, up from 55 percent
               2 Intelligent security systems to
                                                     last year.1 Modern trends in enterprise computing, the rise of social
                 combat insider threats
                                                     media, the cloud, mobility and the era of big data are making insider
               3 Enhancing security with intelli-    threats harder to identify, and giving insiders more ways to pass protected
                 gence and analytics                 information to outsiders with less chance of discovery.

               4 Conclusion                          Security intelligence can help combat insider threats amid the digital
                                                     information explosion. IBM has the ability to identify and protect against
                                                     internal threats through a distinctive combination of robust foundational
                                                     controls and intelligent reporting and management tools. Our solutions
                                                     can help you protect valuable business assets, foster secure and efficient
                                                     collaboration, and effectively integrate security into existing business
                                                     processes.

                                                     The evolution of insider threats
                                                     In the past, insider threats typically referred to an employee with
                                                     privileged access to sensitive or private data that could accidentally or
                                                     deliberately alter that information or give it to an inappropriate recipient.
                                                     Digital collaboration, mobility and social business have expanded the
                                                     insider threat to include employees, contractors, consultants and even
                                                     partners and service providers. Today we see three
                                                     categories of insider threat:

                                                     ●   Trusted unwitting insiders—employees with privileged access that
                                                         unwittingly expose sensitive data
                                                     ●   Trusted witting insiders—privileged employees that purposely expose
                                                         private data to an external party
                                                     ●   Untrusted insiders—unauthorized users who have assumed the identity
                                                         of a trusted insider
IBM Security                                                                                                  White Paper Executive Summary




Trusted unwitting insider threats are unintentional. Careless              research and sophisticated technology, you can take an intelli-
employees may ignore strong password policies, leaving their               gent approach to combating insider threats with foundational
laptop open to a malicious actor. IT managers could mishandle              security elements, including:
offsite backup tapes and inadvertently expose sensitive company
information. Database administrators may accidentally expand               ●   Data protection
read/write permissions to database tables, forget to patch a               ●   Privileged user monitoring
database vulnerability or use default system settings and config-           ●   Identity and access management
urations. But even the unintentional actions of trusted unwit-             ●   Data redaction
ting insiders have serious consequences when it comes to the               ●   Security intelligence and analytics
theft or exposure of precious corporate assets such as revenue
figures, trade secrets, intellectual property, sensitive negotiations       Securing the flow of data
and customer information.                                                  The move to new platforms including cloud, virtualization,
                                                                           mobile and social business makes it hard to secure the flow of
The trusted witting insider has malicious intent to alter or steal         data. Your trusted users can access applications from anywhere
data. These individuals may be motivated by greed or resent-               and they continue to blur the lines between personal and pro-
ment or could be the victims of extortion. Thumb drives, the               fessional use of devices and data. Enterprises need a 360-degree
explosion of data on enterprise networks, and increases in                 strategy for protecting diverse types of data, including
mobility and social media make it easier for privileged users to           structured and unstructured, online and offline, and within
extract sensitive information without detection.                           development and test environments. Data protection to combat
                                                                           internal threats should include:
The untrusted insider threats are the most difficult to discern
and give malicious individuals privileged access to your data and          ●   Database vulnerability assessment
systems. These adversaries take advantage of compromised or                ●   Database activity monitoring and access prevention
stolen user credentials, backdoors and malware to masquerade               ●   Access monitoring for file shares
as trusted users behind your firewall and other perimeter                   ●   Data encryption
defenses.                                                                  ●   Automated data discovery

According to the 2011 Cyber Security Watch Survey,                         Security intelligence and analytics can evaluate the effectiveness
33 percent of respondents view insider attacks to be more costly           of your data protection technologies. They can also correlate
than external threats, compared to 25 percent in 2010.2 With               large amounts of security event data to isolate anomalies and
added dimensions to the insider threat and the boundaries of               identify patterns of insider abuse.
IT infrastructure being extended or altogether obliterated,
security intelligence must inform your technical controls,                 Monitoring privileged users
security policies and user education.                                      User activity monitoring is a critical part of active defense
                                                                           against insider threats. The 2010 Verizon Data Breach
                                                                           Investigations Report notes that “insiders were at least three
Intelligent security systems to combat
                                                                           times more likely to steal intellectual property than outsiders.”3
insider threats                                                            But organizations often lack the security intelligence needed to
Internal threats are difficult to identify and eradicate because
                                                                           link insiders to malicious behavior. A privileged user activity
they manifest as privileged users performing legitimate func-
                                                                           monitoring solution establishes baseline patterns of activity
tions. Armed with deep business insight, advanced security




                                                                       2
IBM Security                                                                                                 White Paper Executive Summary




for each user, and then creates alerts when anomalous behavior            Enhancing security with intelligence and
is observed, certain applications/systems are accessed, or                analytics
unusual volumes of data are sent or received. Based on                    Even with the foundational security controls needed to protect
security intelligence, user activity monitoring solutions provide         against malicious internal attacks—authentication systems,
comprehensive visibility into user activity and its impact. This          asset tracking and data protection software, device and Internet
technology collects and correlates not only log data, but also            usage monitoring, and more—it remains difficult to detect
Layer 7 network flows, asset data, configuration information                insiders performing legitimate functions from a legitimate
and vulnerability data to identify pre-threat exposures and               place. Security intelligence provides a better understanding
compromised employee accounts.                                            of the steady state, so you can recognize actions that deviate
                                                                          from expected boundaries such as number of connections, data
                                                                          transmitted and requested transactions.
Apparel company detects insider data theft
                                                                          Security intelligence also helps detect insider threats occurring
User activity monitoring from IBM helped a large apparel                  over an extended time period. IBM uses security intelligence to
company discover the insider theft of sensitive intellectual
                                                                          focus on specific events, assets or transaction types to store and
property. By correlating database access (via logs) with
                                                                          analyze a much smaller and more manageable amount of data.
employee email transmissions (via flows) and comparing
                                                                          This makes it possible to identify even a “low and slow” attack
this activity against the employee’s “baseline” activity, the
solution was able to identify anomalous behavior indicative               from the inside.
of an insider threat. As a result, the company identified the
employee and stopped the action before the theft was                      It is more difficult to recover from an insider attack because
complete.                                                                 insiders use their privileged access to clean up the systems
                                                                          they’ve attacked and eliminate their tracks. Security intelligence
                                                                          and analytics solutions keep a forensic activity trail at the intelli-
                                                                          gence hub, away from the actual systems that are being com-
                                                                          promised. This facilitates identification of the attacker and
Managing identities and access for secure
collaboration                                                             simplifies clean up.
In the face of insider threats, protecting valuable data and
resources takes more than a simple user ID and password. You              IBM security intelligence and analytics enable communication,
need strong authentication that relies on sound policy for iden-          correlation and analysis at a granular level across a wide range
tity assurance. This helps not only protect against the bad guys;         of security components, including authentication gateways,
it also eliminates opportunities for negligent insiders to unin-          physical security systems, asset management tools, data
tentionally leak data and helps prevent insider threats that origi-       protection technology, network monitoring capabilities, data-
nate from lax deprovisioning of expired or orphan accounts.               base monitoring and web security platforms. One reason organ-
                                                                          izations find it difficult to detect insider attacks is the time it
Identity and access management (IAM) solutions should                     takes to analyze a vast amount of data coming from a wide array
help classify users by roles and access requirements and set              of devices, entry points and user accounts. Consider how much
policies for automated user life cycle and password manage-               more powerful and streamlined your insider threat detection
ment. Role-based policies make it easier to manage exceptions             capabilities can become when events are correlated across the
and identify abuse that could signal an insider threat. IAM solu-         IT environment.
tions should also perform monitoring and enforcement to help
identify policy violations. It is not enough to simply allow or
deny access to applications; you must know who is requesting
access and why, and what an individual is doing with access
rights once they are received.




                                                                      3
Conclusion
It has become more important, yet more difficult, to secure
critical information and related assets from insider threats. IT
complexity is the leading cause of increasing fraud exposure,
cited by 36 percent of 2011 Kroll Annual Global Fraud Report
                                                                         © Copyright IBM Corporation 2011
respondents compared with 28 percent last year. Developing
security intelligence—the ability to proactively predict, identify       IBM Corporation
and react to potential threats—is a top priority. IBM offers             Software Group
                                                                         Route 100
foundational security controls, and security intelligence and            Somers, NY 10589
analytics to address the full spectrum of insider threats. We can        U.S.A.
help you assess your current risk to insider attacks and develop         Produced in the United States of America
a strategic, prioritized approach to prevention across the               December 2011
extended enterprise.                                                     All Rights Reserved

                                                                         IBM, the IBM logo, and ibm.com are trademarks of International Business
                                                                         Machines Corporation in the United States, other countries or both.
For more information                                                     If these and other IBM trademarked terms are marked on their first
To learn more about IBM Security, please contact your                    occurrence in this information with a trademark symbol (® or ™), these
IBM marketing representative or IBM Business Partner,                    symbols indicate U.S. registered or common law trademarks owned by
                                                                         IBM at the time this information was published. Such trademarks may also
or visit the following website: ibm.com/security
                                                                         be registered or common law trademarks in other countries. A current list
                                                                         of IBM trademarks is available on the web at “Copyright and trademark
Additionally, IBM Global Financing can help you acquire the              information” at ibm.com/legal/copytrade.shtml
IT solutions that your business needs in the most cost-effective         Other company, product or service names may be trademarks or service
and strategic way possible. We’ll partner with credit qualified           marks of others.
clients to customize an IT financing solution to suit your busi-          References in this publication to IBM products and services do not imply
ness goals, enable effective cash management, and improve your           that IBM intends to make them available in all countries in which
total cost of ownership. IBM Global Financing is your smartest           IBM operates.

choice to fund critical IT investments and propel your business          Product data has been reviewed for accuracy as of the date of initial
forward. For more information, visit: ibm.com/financing                   publication. Product data is subject to change without notice. Any
                                                                         statements regarding IBM’s future direction and intent are subject
                                                                         to change or withdrawal without notice, and represent goals and
                                                                         objectives only.

                                                                         The customer is responsible for ensuring compliance with legal
                                                                         requirements. It is the customer’s sole responsibility to obtain advice of
                                                                         competent legal counsel as to the identification and interpretation of any
                                                                         relevant laws and regulatory requirements that may affect the customer’s
                                                                         business and any actions the customer may need to take to comply with
                                                                         such laws. IBM does not provide legal advice or represent or warrant that
                                                                         its services or products will ensure that the customer is in compliance with
                                                                         any law or regulation.
                                                                     1
                                                                         Source: “Most Fraud is an Inside Job, Says Survey”; CSO Magazine;
                                                                         Nov. 9, 2011.
                                                                     2
                                                                         Source: CERT- http://www.cert.org/insider_threat
                                                                     3
                                                                         http://www.verizonbusiness.com/resources/reports/
                                                                         rp_2010-data-breach-report_en_xg.pdf


                                                                                  Please Recycle




                                                                                                                              WGE03014-USEN-00

Contenu connexe

Plus de Arrow ECS UK

Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class LinkArrow ECS UK
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS UK
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internetArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow ECS UK
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow ECS UK
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow ECS UK
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMArrow ECS UK
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow ECS UK
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewArrow ECS UK
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Arrow ECS UK
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateArrow ECS UK
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the CompetitionArrow ECS UK
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersArrow ECS UK
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelArrow ECS UK
 
Big Data & Information Management Channel Manager
Big Data & Information Management Channel ManagerBig Data & Information Management Channel Manager
Big Data & Information Management Channel ManagerArrow ECS UK
 
Business Partner Product Enablement Roadmap, IBM Predictive Analytics
Business Partner Product Enablement Roadmap, IBM Predictive AnalyticsBusiness Partner Product Enablement Roadmap, IBM Predictive Analytics
Business Partner Product Enablement Roadmap, IBM Predictive AnalyticsArrow ECS UK
 
Data Retention and eDiscovery from Symantec
Data Retention and eDiscovery from SymantecData Retention and eDiscovery from Symantec
Data Retention and eDiscovery from SymantecArrow ECS UK
 

Plus de Arrow ECS UK (20)

Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class Link
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business Partners
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart Simmons
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian French
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David Fearne
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete Story
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBM
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV Jam
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing Overview
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan template
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the Competition
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business Partners
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics Channel
 
Big Data & Information Management Channel Manager
Big Data & Information Management Channel ManagerBig Data & Information Management Channel Manager
Big Data & Information Management Channel Manager
 
Business Partner Product Enablement Roadmap, IBM Predictive Analytics
Business Partner Product Enablement Roadmap, IBM Predictive AnalyticsBusiness Partner Product Enablement Roadmap, IBM Predictive Analytics
Business Partner Product Enablement Roadmap, IBM Predictive Analytics
 
Data Retention and eDiscovery from Symantec
Data Retention and eDiscovery from SymantecData Retention and eDiscovery from Symantec
Data Retention and eDiscovery from Symantec
 

Dernier

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Dernier (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Security intellignce wge03014 usen

  • 1. IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent security Identifying and mitigating insider threats in the age of big data Today organizations are faced with protecting data and applications against external and internal threats across a complex security landscape. Contents According to the Kroll Annual Global Fraud Report, a recent survey that 1 The evolution of insider threats polled more than 1,200 senior executives worldwide, 2011 figures show that 60 percent of frauds are committed by insiders, up from 55 percent 2 Intelligent security systems to last year.1 Modern trends in enterprise computing, the rise of social combat insider threats media, the cloud, mobility and the era of big data are making insider 3 Enhancing security with intelli- threats harder to identify, and giving insiders more ways to pass protected gence and analytics information to outsiders with less chance of discovery. 4 Conclusion Security intelligence can help combat insider threats amid the digital information explosion. IBM has the ability to identify and protect against internal threats through a distinctive combination of robust foundational controls and intelligent reporting and management tools. Our solutions can help you protect valuable business assets, foster secure and efficient collaboration, and effectively integrate security into existing business processes. The evolution of insider threats In the past, insider threats typically referred to an employee with privileged access to sensitive or private data that could accidentally or deliberately alter that information or give it to an inappropriate recipient. Digital collaboration, mobility and social business have expanded the insider threat to include employees, contractors, consultants and even partners and service providers. Today we see three categories of insider threat: ● Trusted unwitting insiders—employees with privileged access that unwittingly expose sensitive data ● Trusted witting insiders—privileged employees that purposely expose private data to an external party ● Untrusted insiders—unauthorized users who have assumed the identity of a trusted insider
  • 2. IBM Security White Paper Executive Summary Trusted unwitting insider threats are unintentional. Careless research and sophisticated technology, you can take an intelli- employees may ignore strong password policies, leaving their gent approach to combating insider threats with foundational laptop open to a malicious actor. IT managers could mishandle security elements, including: offsite backup tapes and inadvertently expose sensitive company information. Database administrators may accidentally expand ● Data protection read/write permissions to database tables, forget to patch a ● Privileged user monitoring database vulnerability or use default system settings and config- ● Identity and access management urations. But even the unintentional actions of trusted unwit- ● Data redaction ting insiders have serious consequences when it comes to the ● Security intelligence and analytics theft or exposure of precious corporate assets such as revenue figures, trade secrets, intellectual property, sensitive negotiations Securing the flow of data and customer information. The move to new platforms including cloud, virtualization, mobile and social business makes it hard to secure the flow of The trusted witting insider has malicious intent to alter or steal data. Your trusted users can access applications from anywhere data. These individuals may be motivated by greed or resent- and they continue to blur the lines between personal and pro- ment or could be the victims of extortion. Thumb drives, the fessional use of devices and data. Enterprises need a 360-degree explosion of data on enterprise networks, and increases in strategy for protecting diverse types of data, including mobility and social media make it easier for privileged users to structured and unstructured, online and offline, and within extract sensitive information without detection. development and test environments. Data protection to combat internal threats should include: The untrusted insider threats are the most difficult to discern and give malicious individuals privileged access to your data and ● Database vulnerability assessment systems. These adversaries take advantage of compromised or ● Database activity monitoring and access prevention stolen user credentials, backdoors and malware to masquerade ● Access monitoring for file shares as trusted users behind your firewall and other perimeter ● Data encryption defenses. ● Automated data discovery According to the 2011 Cyber Security Watch Survey, Security intelligence and analytics can evaluate the effectiveness 33 percent of respondents view insider attacks to be more costly of your data protection technologies. They can also correlate than external threats, compared to 25 percent in 2010.2 With large amounts of security event data to isolate anomalies and added dimensions to the insider threat and the boundaries of identify patterns of insider abuse. IT infrastructure being extended or altogether obliterated, security intelligence must inform your technical controls, Monitoring privileged users security policies and user education. User activity monitoring is a critical part of active defense against insider threats. The 2010 Verizon Data Breach Investigations Report notes that “insiders were at least three Intelligent security systems to combat times more likely to steal intellectual property than outsiders.”3 insider threats But organizations often lack the security intelligence needed to Internal threats are difficult to identify and eradicate because link insiders to malicious behavior. A privileged user activity they manifest as privileged users performing legitimate func- monitoring solution establishes baseline patterns of activity tions. Armed with deep business insight, advanced security 2
  • 3. IBM Security White Paper Executive Summary for each user, and then creates alerts when anomalous behavior Enhancing security with intelligence and is observed, certain applications/systems are accessed, or analytics unusual volumes of data are sent or received. Based on Even with the foundational security controls needed to protect security intelligence, user activity monitoring solutions provide against malicious internal attacks—authentication systems, comprehensive visibility into user activity and its impact. This asset tracking and data protection software, device and Internet technology collects and correlates not only log data, but also usage monitoring, and more—it remains difficult to detect Layer 7 network flows, asset data, configuration information insiders performing legitimate functions from a legitimate and vulnerability data to identify pre-threat exposures and place. Security intelligence provides a better understanding compromised employee accounts. of the steady state, so you can recognize actions that deviate from expected boundaries such as number of connections, data transmitted and requested transactions. Apparel company detects insider data theft Security intelligence also helps detect insider threats occurring User activity monitoring from IBM helped a large apparel over an extended time period. IBM uses security intelligence to company discover the insider theft of sensitive intellectual focus on specific events, assets or transaction types to store and property. By correlating database access (via logs) with analyze a much smaller and more manageable amount of data. employee email transmissions (via flows) and comparing This makes it possible to identify even a “low and slow” attack this activity against the employee’s “baseline” activity, the solution was able to identify anomalous behavior indicative from the inside. of an insider threat. As a result, the company identified the employee and stopped the action before the theft was It is more difficult to recover from an insider attack because complete. insiders use their privileged access to clean up the systems they’ve attacked and eliminate their tracks. Security intelligence and analytics solutions keep a forensic activity trail at the intelli- gence hub, away from the actual systems that are being com- promised. This facilitates identification of the attacker and Managing identities and access for secure collaboration simplifies clean up. In the face of insider threats, protecting valuable data and resources takes more than a simple user ID and password. You IBM security intelligence and analytics enable communication, need strong authentication that relies on sound policy for iden- correlation and analysis at a granular level across a wide range tity assurance. This helps not only protect against the bad guys; of security components, including authentication gateways, it also eliminates opportunities for negligent insiders to unin- physical security systems, asset management tools, data tentionally leak data and helps prevent insider threats that origi- protection technology, network monitoring capabilities, data- nate from lax deprovisioning of expired or orphan accounts. base monitoring and web security platforms. One reason organ- izations find it difficult to detect insider attacks is the time it Identity and access management (IAM) solutions should takes to analyze a vast amount of data coming from a wide array help classify users by roles and access requirements and set of devices, entry points and user accounts. Consider how much policies for automated user life cycle and password manage- more powerful and streamlined your insider threat detection ment. Role-based policies make it easier to manage exceptions capabilities can become when events are correlated across the and identify abuse that could signal an insider threat. IAM solu- IT environment. tions should also perform monitoring and enforcement to help identify policy violations. It is not enough to simply allow or deny access to applications; you must know who is requesting access and why, and what an individual is doing with access rights once they are received. 3
  • 4. Conclusion It has become more important, yet more difficult, to secure critical information and related assets from insider threats. IT complexity is the leading cause of increasing fraud exposure, cited by 36 percent of 2011 Kroll Annual Global Fraud Report © Copyright IBM Corporation 2011 respondents compared with 28 percent last year. Developing security intelligence—the ability to proactively predict, identify IBM Corporation and react to potential threats—is a top priority. IBM offers Software Group Route 100 foundational security controls, and security intelligence and Somers, NY 10589 analytics to address the full spectrum of insider threats. We can U.S.A. help you assess your current risk to insider attacks and develop Produced in the United States of America a strategic, prioritized approach to prevention across the December 2011 extended enterprise. All Rights Reserved IBM, the IBM logo, and ibm.com are trademarks of International Business Machines Corporation in the United States, other countries or both. For more information If these and other IBM trademarked terms are marked on their first To learn more about IBM Security, please contact your occurrence in this information with a trademark symbol (® or ™), these IBM marketing representative or IBM Business Partner, symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also or visit the following website: ibm.com/security be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the web at “Copyright and trademark Additionally, IBM Global Financing can help you acquire the information” at ibm.com/legal/copytrade.shtml IT solutions that your business needs in the most cost-effective Other company, product or service names may be trademarks or service and strategic way possible. We’ll partner with credit qualified marks of others. clients to customize an IT financing solution to suit your busi- References in this publication to IBM products and services do not imply ness goals, enable effective cash management, and improve your that IBM intends to make them available in all countries in which total cost of ownership. IBM Global Financing is your smartest IBM operates. choice to fund critical IT investments and propel your business Product data has been reviewed for accuracy as of the date of initial forward. For more information, visit: ibm.com/financing publication. Product data is subject to change without notice. Any statements regarding IBM’s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. The customer is responsible for ensuring compliance with legal requirements. It is the customer’s sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law or regulation. 1 Source: “Most Fraud is an Inside Job, Says Survey”; CSO Magazine; Nov. 9, 2011. 2 Source: CERT- http://www.cert.org/insider_threat 3 http://www.verizonbusiness.com/resources/reports/ rp_2010-data-breach-report_en_xg.pdf Please Recycle WGE03014-USEN-00