SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Threat Hunting in Windows –
Are You Hunting or Being Hunted?
by Dr. Eric Cole
© 2017 Secure Anchor Consulting.
All rights reserved.
© 2015 The SANS™ Institute – www.sans.org
Threat Landscape
Today, three absolute
facts are relevant when it
comes to security:
1) an organization cannot
prevent all attacks;
2) an organization’s network
is going to be compromised;
3) 100% security does not
exist.
2
Threat hunting is the
act of aggressively
tracking and
eliminating cyber
adversaries from your
network as early as
possible.
© 2015 The SANS™ Institute – www.sans.org
Introduction
If attackers compromised your Windows systems,
how would you know?
3
Threat hunting focuses on:
• Gaining better visibility into the organization’s
weaknesses
• Providing early and accurate detection
• Controlling damage
• Tracking activity and looking for anomalies
• Obtaining better visibility in key activities
© 2016 The SANS™ Institute – www.sans.org 4
Goals of Threat Hunting
• To provide early and accurate
detection
• To control and reduce impact
and damage with faster
response
• To improve defenses to make
successful attacks
increasingly difficult
• To gain better visibility into the
organization’s weaknesses by
monitoring Windows activity
© 2015 The SANS™ Institute – www.sans.org
Why We Need to Hunt
Traditional security methods (such as antivirus, network IDSes and
firewalls) can’t catch today’s advanced targeted threats because such
threats work around security controls
5
Threat hunting includes the
following activities:
• Understanding the threats
• Identifying critical data and
business processes utilizing that
data
• Distinguishing good from bad
behavior
• Leveraging threat intelligence for
discovery, detection and analysis
• Analyzing all this data, along
with vulnerability data and other
sources of network/endpoint
behaviors, for anomalies that
are both “known bad” and never
before seen
• Looking for anomalies, learning
abnormal behavior and
understanding the network
© 2015 The SANS™ Institute – www.sans.org
Search and Detect
How Well Do You Know Your Windows System
Understanding activity and profiles is critical to pursuing your adversary via the hunt
cycle. There are two approaches:
• Searching for known threats by gathering existing IoCs or other tactical details,
such as the signature of an attack. Implement techniques to harvest data from
your critical assets (e.g., search for a specific malicious binary hash or for a
command and control URL in a network flow database).
• Detecting unknown threats. This type of advanced hunting is challenging due
to a lack of intelligence to spark the investigation. Confirm baselines of normal
activity over time so you know what deviations from the norm look like. If you do
not have a set of baselines, look for deviations from known or historic behavior.
6
© 2015 The SANS™ Institute – www.sans.org
Metrics of the Hunt
Organizations need to report in clear metrics a measurable reduction in
risk that ties to their preparation, response and follow-up in the threat
hunt cycle.
7
• Fewer actual breaches
• Reduced attack surface/system hardening improvements
• Shorter dwell time (the time between when an attacker first gains unauthorized access and
when the bad actor is removed from the network)
• Minimization and reduction of unauthorized lateral movement between internal systems
• Reduction of exposure by finding and stopping threats before they gain a foothold
• Fewer actual breaches
© 2015 The SANS™ Institute – www.sans.org
Keys to a Successful Hunt
In many large organizations, hunting for breaches is like
looking for a needle in a haystack.
8
The basic methodology of a successful hunting program includes the
following:
• Augmenting humans with tools and automation across all areas of the hunt
chain
• Segmenting and de-scoping the area of analysis
• Having focused goals
• Limiting the search (deeper is better than narrow)
• Recording metrics that demonstrate business-relevant gains, such as
reduced time to contain and mitigate
© 2015 The SANS™ Institute – www.sans.org
Evolving the Hunt
9
Because adversaries continue to change their patterns, the hunting process
must do the following:
• Adapt to changes in behaviors and learn how the adversary works.
• Watch all behaviors of the adversary, including known good, known bad and unknown
or unclassified behaviors. Looking for anomalies that deviate from normal behavior
can help detect unknown or previously unseen hostile activity.
• Identify adverse activity, track it, and alert administrators to the suspicious activity.
• Contain and control the damage by identifying attackers’ lateral movements and
removing infected systems from the network.
© 2015 The SANS™ Institute – www.sans.org
Conclusion
Properly automated threat hunting could have kept many of the
organizations that suffered widely publicized breaches out of the news
by minimizing their exposure time.
10
A typical checklist that organizations can use to start an ongoing hunt includes
the following:
• Identifying the data or information most critical to your organization
• Determining which business processes utilize or access this information
• Identifying all of the systems and networks that support key business processes
• Acquiring tools that can help with the correlation and analysis required for proper
hunting
• Gathering information about the traffic flowing to the key systems and networks
• Gathering information about the operations of servers
• Utilizing threat intelligence to understand the threats and exposures to the
organization
• Utilizing tools to perform automated analysis of normal behavior and attack behavior
• Filtering the output of the tools
• Responding appropriately to high-risk alerts
Thank You for Your Time!
DR. Eric Cole
Twitter: drericcole
ecole@secureanchor.com
eric@sans.org
www.securityhaven.com
PowerBroker for
Windows
Least Privilege and Application Control
for Windows Servers and Desktops
Summary: Why PowerBroker for Windows?
• Asset discovery, application control, risk compliance, Windows event
log monitoring included
• Optional: Session monitoring, file integrity monitoring
Deep capability
• U.S. Patent (No. 8,850,549) for the methods and systems employed
for controlling access to resources and privileges per process
Mature, patented
leader
• Tightly integrated with vulnerability management
• Deep reporting and analytics insights for compliance and operations
Centralized
reporting,
analytics and
management
• Privilege and session management on Unix, Linux and Windows
• Privileged password and session management
• Integrate Linux, Unix, and Mac OS X with Microsoft AD
• Real-time auditing of AD, File System, Exchange & SQL
Part of a broad
solution family
Validatedbycustomersandanalystsalike
Your solution should:
• Elevate privileges to applications, not users, on an as-needed basis without
exposing passwords
• Enforce least-privilege access based on an application’s known vulnerabilities
• Track and control applications with known vulnerabilities or malware to further
protect endpoints
• Monitor event logs and file integrity for unauthorized changes to key files and
directories
• Capture keystrokes and screens when rules are triggered with searchable
playback
Product Demonstration
Poll
Thank you for attending
today’s webinar!

Contenu connexe

En vedette

Idées reçues - Transition énergétique
Idées reçues - Transition énergétiqueIdées reçues - Transition énergétique
Idées reçues - Transition énergétique
RAC-F
 

En vedette (17)

4 q16 presentation final
4 q16 presentation   final4 q16 presentation   final
4 q16 presentation final
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting Program
 
Workshop threat-hunting
Workshop threat-huntingWorkshop threat-hunting
Workshop threat-hunting
 
I hunt sys admins 2.0
I hunt sys admins 2.0I hunt sys admins 2.0
I hunt sys admins 2.0
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - GerritzBSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
 
Les professionnels de l'immobilier et les réseaux sociaux - Etude 2017 #DigImmo
Les professionnels de l'immobilier et les réseaux sociaux - Etude 2017 #DigImmoLes professionnels de l'immobilier et les réseaux sociaux - Etude 2017 #DigImmo
Les professionnels de l'immobilier et les réseaux sociaux - Etude 2017 #DigImmo
 
Idées reçues - Transition énergétique
Idées reçues - Transition énergétiqueIdées reçues - Transition énergétique
Idées reçues - Transition énergétique
 
Moderni urheilumarkkinointi 30.03.2017, Sport & Business Forum, Oulu
Moderni urheilumarkkinointi 30.03.2017, Sport & Business Forum, OuluModerni urheilumarkkinointi 30.03.2017, Sport & Business Forum, Oulu
Moderni urheilumarkkinointi 30.03.2017, Sport & Business Forum, Oulu
 
Designing Policy Experimentation
Designing Policy ExperimentationDesigning Policy Experimentation
Designing Policy Experimentation
 
2017 ITRC Databreach Summary Report 03212017
2017 ITRC Databreach Summary Report 032120172017 ITRC Databreach Summary Report 03212017
2017 ITRC Databreach Summary Report 03212017
 
#MobileRevolution - How Mobile Is Changing You
#MobileRevolution - How Mobile Is Changing You#MobileRevolution - How Mobile Is Changing You
#MobileRevolution - How Mobile Is Changing You
 
Solving The Global Crisis
Solving The Global Crisis Solving The Global Crisis
Solving The Global Crisis
 
Deploying deep learning models with Docker and Kubernetes
Deploying deep learning models with Docker and KubernetesDeploying deep learning models with Docker and Kubernetes
Deploying deep learning models with Docker and Kubernetes
 
Sage Gold Inc. Corporate Presentation
Sage Gold Inc. Corporate PresentationSage Gold Inc. Corporate Presentation
Sage Gold Inc. Corporate Presentation
 
[ETUDE] Les Francais, l'épargne et la retraite
[ETUDE] Les Francais, l'épargne et la retraite[ETUDE] Les Francais, l'épargne et la retraite
[ETUDE] Les Francais, l'épargne et la retraite
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive Security
 

Plus de BeyondTrust

Plus de BeyondTrust (20)

The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
 
5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)
 
Unearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseUnearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your Enterprise
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
 
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares AboutUnix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
 
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
 
Mitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT SystemsMitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT Systems
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
 
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation AttacksUsing Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
 
Enemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessEnemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling Access
 

Dernier

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 

Threat Hunting in Windows – Are You Hunting or Being Hunted?

  • 1. Threat Hunting in Windows – Are You Hunting or Being Hunted? by Dr. Eric Cole © 2017 Secure Anchor Consulting. All rights reserved.
  • 2. © 2015 The SANS™ Institute – www.sans.org Threat Landscape Today, three absolute facts are relevant when it comes to security: 1) an organization cannot prevent all attacks; 2) an organization’s network is going to be compromised; 3) 100% security does not exist. 2 Threat hunting is the act of aggressively tracking and eliminating cyber adversaries from your network as early as possible.
  • 3. © 2015 The SANS™ Institute – www.sans.org Introduction If attackers compromised your Windows systems, how would you know? 3 Threat hunting focuses on: • Gaining better visibility into the organization’s weaknesses • Providing early and accurate detection • Controlling damage • Tracking activity and looking for anomalies • Obtaining better visibility in key activities
  • 4. © 2016 The SANS™ Institute – www.sans.org 4 Goals of Threat Hunting • To provide early and accurate detection • To control and reduce impact and damage with faster response • To improve defenses to make successful attacks increasingly difficult • To gain better visibility into the organization’s weaknesses by monitoring Windows activity
  • 5. © 2015 The SANS™ Institute – www.sans.org Why We Need to Hunt Traditional security methods (such as antivirus, network IDSes and firewalls) can’t catch today’s advanced targeted threats because such threats work around security controls 5 Threat hunting includes the following activities: • Understanding the threats • Identifying critical data and business processes utilizing that data • Distinguishing good from bad behavior • Leveraging threat intelligence for discovery, detection and analysis • Analyzing all this data, along with vulnerability data and other sources of network/endpoint behaviors, for anomalies that are both “known bad” and never before seen • Looking for anomalies, learning abnormal behavior and understanding the network
  • 6. © 2015 The SANS™ Institute – www.sans.org Search and Detect How Well Do You Know Your Windows System Understanding activity and profiles is critical to pursuing your adversary via the hunt cycle. There are two approaches: • Searching for known threats by gathering existing IoCs or other tactical details, such as the signature of an attack. Implement techniques to harvest data from your critical assets (e.g., search for a specific malicious binary hash or for a command and control URL in a network flow database). • Detecting unknown threats. This type of advanced hunting is challenging due to a lack of intelligence to spark the investigation. Confirm baselines of normal activity over time so you know what deviations from the norm look like. If you do not have a set of baselines, look for deviations from known or historic behavior. 6
  • 7. © 2015 The SANS™ Institute – www.sans.org Metrics of the Hunt Organizations need to report in clear metrics a measurable reduction in risk that ties to their preparation, response and follow-up in the threat hunt cycle. 7 • Fewer actual breaches • Reduced attack surface/system hardening improvements • Shorter dwell time (the time between when an attacker first gains unauthorized access and when the bad actor is removed from the network) • Minimization and reduction of unauthorized lateral movement between internal systems • Reduction of exposure by finding and stopping threats before they gain a foothold • Fewer actual breaches
  • 8. © 2015 The SANS™ Institute – www.sans.org Keys to a Successful Hunt In many large organizations, hunting for breaches is like looking for a needle in a haystack. 8 The basic methodology of a successful hunting program includes the following: • Augmenting humans with tools and automation across all areas of the hunt chain • Segmenting and de-scoping the area of analysis • Having focused goals • Limiting the search (deeper is better than narrow) • Recording metrics that demonstrate business-relevant gains, such as reduced time to contain and mitigate
  • 9. © 2015 The SANS™ Institute – www.sans.org Evolving the Hunt 9 Because adversaries continue to change their patterns, the hunting process must do the following: • Adapt to changes in behaviors and learn how the adversary works. • Watch all behaviors of the adversary, including known good, known bad and unknown or unclassified behaviors. Looking for anomalies that deviate from normal behavior can help detect unknown or previously unseen hostile activity. • Identify adverse activity, track it, and alert administrators to the suspicious activity. • Contain and control the damage by identifying attackers’ lateral movements and removing infected systems from the network.
  • 10. © 2015 The SANS™ Institute – www.sans.org Conclusion Properly automated threat hunting could have kept many of the organizations that suffered widely publicized breaches out of the news by minimizing their exposure time. 10 A typical checklist that organizations can use to start an ongoing hunt includes the following: • Identifying the data or information most critical to your organization • Determining which business processes utilize or access this information • Identifying all of the systems and networks that support key business processes • Acquiring tools that can help with the correlation and analysis required for proper hunting • Gathering information about the traffic flowing to the key systems and networks • Gathering information about the operations of servers • Utilizing threat intelligence to understand the threats and exposures to the organization • Utilizing tools to perform automated analysis of normal behavior and attack behavior • Filtering the output of the tools • Responding appropriately to high-risk alerts
  • 11. Thank You for Your Time! DR. Eric Cole Twitter: drericcole ecole@secureanchor.com eric@sans.org www.securityhaven.com
  • 12. PowerBroker for Windows Least Privilege and Application Control for Windows Servers and Desktops
  • 13. Summary: Why PowerBroker for Windows? • Asset discovery, application control, risk compliance, Windows event log monitoring included • Optional: Session monitoring, file integrity monitoring Deep capability • U.S. Patent (No. 8,850,549) for the methods and systems employed for controlling access to resources and privileges per process Mature, patented leader • Tightly integrated with vulnerability management • Deep reporting and analytics insights for compliance and operations Centralized reporting, analytics and management • Privilege and session management on Unix, Linux and Windows • Privileged password and session management • Integrate Linux, Unix, and Mac OS X with Microsoft AD • Real-time auditing of AD, File System, Exchange & SQL Part of a broad solution family Validatedbycustomersandanalystsalike
  • 14. Your solution should: • Elevate privileges to applications, not users, on an as-needed basis without exposing passwords • Enforce least-privilege access based on an application’s known vulnerabilities • Track and control applications with known vulnerabilities or malware to further protect endpoints • Monitor event logs and file integrity for unauthorized changes to key files and directories • Capture keystrokes and screens when rules are triggered with searchable playback
  • 16. Poll
  • 17. Thank you for attending today’s webinar!