SlideShare une entreprise Scribd logo
1  sur  18
#RSAC
SESSION ID:
Michael Muckin Scott Fitch
Achieving Defendable
Architectures via
Threat-Driven Methodologies
ANF-F03
LM Fellow, Cyber Architect
Lockheed Martin
LM Fellow, Cyber Architect
Lockheed Martin
#RSAC
2
The system shall encrypt data at rest.
#RSAC
3
System Threat
Analysis
Threat
Intelligence
The Threat Driven Approach
#RSAC
Reconnaissance1
Weaponization2
Delivery3
Exploitation4
Installation5
Command & Control6
Actions on Objectives7
Synthesis
Threat Intelligence
Analysis
#RSAC
System Threat Analysis Methodology
5
Discovery Phase
Implementation Phase
There are no IDDIL (idle) Threats; they ATC (attack)
Identify the Assets
Define the Attack Surface
Decompose the System
Identify Attack Vectors
List Threat Actors
Analysis and Assessment
Triage
Controls
#RSAC
System Threat Analysis Methodology
6
Identify the Assets
Define the Attack Surface
Decompose the System
Identify Attack Vectors
List Threat Actors
Analysis and Assessment
Triage
Controls
Critical Assets
Knowledge of Industry
Mission Impacts
Mission Needs
Targeted Assets
Tactics, Techniques, & Procedures
Tactics, Techniques, & Procedures
Campaigns, Motivation, Skill
Inputs on likelihood
Threat Intelligence
Control Effectiveness
System Threat Analysis
#RSAC
Threat Methodology Integration
7
Concept Reqs Design Build Test/QA Deploy Ops
Threat Modeling & Analysis
Threat Intelligence
I D D I L A T C
Testing Aligned
to Threat Model
Threat Actors, TTPs,
Existing Controls
Infrastructure & Service
Enhancements
Current TTPs and
Targeting Intel
#RSAC
Threat Methodology Practices
 Threat Models
 Attack Trees
 Threat Profiles
 Cyber Kill Chain®
 Controls Effectiveness Matrix
8
#RSAC
Case Study
9
Assets:
 Smart Card
 OS and Applet
 ID codes
 Keys
 I&AM Systems
 Workstations
 Facilities
Threat Actors/Attack Vectors:
1. Man-in-Manufacturer (a)
2. Man-in-Manufacturer (b)
3. Interception of Master Key
4. Compromise of I&AM System
5. Malicious Insider
6. Compromise Critical Role
7. Compromise middleware
8. Physical attacks
Provisioning
Credentialing
PKI Interface
Physical Security
HR Interface
Critical Roles:
Role A
Role X
Service Acct
#RSAC
Determining Focus Threats
10
System Threats
Physical Attacks
Malicious Insider
Threat Intelligence
Adversary Objectives
TTPs
Focus
Threats
Mission and
Business Needs
Malicious Code on Card
Compromised Middleware
Lateral Movement
Disclosure of Keys
Critical Role Exploited
#RSAC
Addressing Threats
Asset/
Objective
Threat Types Resultant
Condition(s)
Attack Surface/
Vector
Controls
SmartCard OS • Tampering
• Disclosure
• Elevation of Privilege
• Lateral Movement
Dependent upon # of
cards and level of
access of user
• Card
• Card OS code
• APDU manipulation
• Code Audits
• Contract language
• Privileged account
restrictions
Critical Role • Spoofing
• Repudiation
• Elevation of Privilege
• Lateral Movement
Unauthorized,
privileged and
potentially untraceable
activity to critical
infrastructure
• I&AM Systems
• Specific interfaces
• Specific services
• Targeted user and
service accounts
• Admin gateways
• Multi-factor AuthN
• Local accounts
wherever possible
• Privileged account
password controls
Workstation • Disclosure
• Elevation of Privilege
• Lateral Movement
Exfil data and/or
credentials;
Use machine as
foothold for further
actions
• SmartCard
• Middleware
• Memory
• System patching
• HIPS
• Memory protections
• Penetration testing /
assessment
• Configuration controls
11
#RSAC
Defend the System as a Whole
 Visibility into current and
historical system activity
 Manageability of system
configuration, updates, and
control settings
 Survivability to deliver
services through attack,
detection, and recovery
12
#RSAC
Designing for Defense
13
 Visibility
 Server logging
 Workstation
logging
 Network
monitoring
 Cardstock
inventory
 Insider detection
Provisioning
Credentialing
PKI Interface
Physical Security
HR Interface
Critical Roles:
Role A
Role X
Service Acct
#RSAC
Designing for Defense
14
 Visibility
 Manageability
 Rules based on
new threat intel
 Control points
for tactical
mitigations
 System patching
 Controlled
admin access
Provisioning
Credentialing
PKI Interface
Physical Security
HR Interface
Critical Roles:
Role A
Role X
Service Acct
#RSAC
Designing for Defense
15
 Visibility
 Manageability
 Survivability
 System
segmentation
 Strong admin
authentication
 Separate card
use from issuance
 Assured system
recovery
Provisioning
Credentialing
PKI Interface
Physical Security
HR Interface
Critical Roles:
Role A
Role X
Service Acct
#RSAC
16
System Threat
Analysis
Threat
Intelligence
Use IDDIL/ATC to select protection and appropriate compensating controls
Design the system to be defended through visibility, manageability, and survivability
#RSAC
Building Defendable Architectures and
Applying Threat-Driven Methodologies
17
Start identifying your organization’s critical systems and assets
Use IDDIL/ATC to select protection and appropriate compensating controls
Design the system to be defended through visibility, manageability, and survivability
For the next system you build, modify, operate, or assess
Integrate threat intelligence into design, development, and operations
As your cyber defense capabilities mature
#RSAC
18
http://lockheedmartin.com/cyber

Contenu connexe

Tendances

Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
ENOInstitute
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
Hamisi Kibonde
 

Tendances (20)

Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
 
Blue Team
Blue TeamBlue Team
Blue Team
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Cyber security analysis presentation
Cyber security analysis presentationCyber security analysis presentation
Cyber security analysis presentation
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 

Similaire à Achieving Defendable Architectures Via Threat Driven Methodologies

Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 

Similaire à Achieving Defendable Architectures Via Threat Driven Methodologies (20)

Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
 
Threat intelligence solution
Threat intelligence solutionThreat intelligence solution
Threat intelligence solution
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
A Fully Automated SOC: Fact or Fiction
A Fully Automated SOC: Fact or FictionA Fully Automated SOC: Fact or Fiction
A Fully Automated SOC: Fact or Fiction
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detectionThreat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detection
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
ISACA -Threat Hunting using Native Windows tools .pdf
ISACA -Threat Hunting using Native Windows tools .pdfISACA -Threat Hunting using Native Windows tools .pdf
ISACA -Threat Hunting using Native Windows tools .pdf
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Breaking and entering how and why dhs conducts penetration tests
Breaking and entering  how and why dhs conducts penetration testsBreaking and entering  how and why dhs conducts penetration tests
Breaking and entering how and why dhs conducts penetration tests
 
Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agenda
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineer
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
Realities of Security in the Cloud - CSS ATX 2017
Realities of Security in the Cloud - CSS ATX 2017Realities of Security in the Cloud - CSS ATX 2017
Realities of Security in the Cloud - CSS ATX 2017
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
 

Plus de Priyanka Aash

Plus de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Achieving Defendable Architectures Via Threat Driven Methodologies

  • 1. #RSAC SESSION ID: Michael Muckin Scott Fitch Achieving Defendable Architectures via Threat-Driven Methodologies ANF-F03 LM Fellow, Cyber Architect Lockheed Martin LM Fellow, Cyber Architect Lockheed Martin
  • 2. #RSAC 2 The system shall encrypt data at rest.
  • 5. #RSAC System Threat Analysis Methodology 5 Discovery Phase Implementation Phase There are no IDDIL (idle) Threats; they ATC (attack) Identify the Assets Define the Attack Surface Decompose the System Identify Attack Vectors List Threat Actors Analysis and Assessment Triage Controls
  • 6. #RSAC System Threat Analysis Methodology 6 Identify the Assets Define the Attack Surface Decompose the System Identify Attack Vectors List Threat Actors Analysis and Assessment Triage Controls Critical Assets Knowledge of Industry Mission Impacts Mission Needs Targeted Assets Tactics, Techniques, & Procedures Tactics, Techniques, & Procedures Campaigns, Motivation, Skill Inputs on likelihood Threat Intelligence Control Effectiveness System Threat Analysis
  • 7. #RSAC Threat Methodology Integration 7 Concept Reqs Design Build Test/QA Deploy Ops Threat Modeling & Analysis Threat Intelligence I D D I L A T C Testing Aligned to Threat Model Threat Actors, TTPs, Existing Controls Infrastructure & Service Enhancements Current TTPs and Targeting Intel
  • 8. #RSAC Threat Methodology Practices  Threat Models  Attack Trees  Threat Profiles  Cyber Kill Chain®  Controls Effectiveness Matrix 8
  • 9. #RSAC Case Study 9 Assets:  Smart Card  OS and Applet  ID codes  Keys  I&AM Systems  Workstations  Facilities Threat Actors/Attack Vectors: 1. Man-in-Manufacturer (a) 2. Man-in-Manufacturer (b) 3. Interception of Master Key 4. Compromise of I&AM System 5. Malicious Insider 6. Compromise Critical Role 7. Compromise middleware 8. Physical attacks Provisioning Credentialing PKI Interface Physical Security HR Interface Critical Roles: Role A Role X Service Acct
  • 10. #RSAC Determining Focus Threats 10 System Threats Physical Attacks Malicious Insider Threat Intelligence Adversary Objectives TTPs Focus Threats Mission and Business Needs Malicious Code on Card Compromised Middleware Lateral Movement Disclosure of Keys Critical Role Exploited
  • 11. #RSAC Addressing Threats Asset/ Objective Threat Types Resultant Condition(s) Attack Surface/ Vector Controls SmartCard OS • Tampering • Disclosure • Elevation of Privilege • Lateral Movement Dependent upon # of cards and level of access of user • Card • Card OS code • APDU manipulation • Code Audits • Contract language • Privileged account restrictions Critical Role • Spoofing • Repudiation • Elevation of Privilege • Lateral Movement Unauthorized, privileged and potentially untraceable activity to critical infrastructure • I&AM Systems • Specific interfaces • Specific services • Targeted user and service accounts • Admin gateways • Multi-factor AuthN • Local accounts wherever possible • Privileged account password controls Workstation • Disclosure • Elevation of Privilege • Lateral Movement Exfil data and/or credentials; Use machine as foothold for further actions • SmartCard • Middleware • Memory • System patching • HIPS • Memory protections • Penetration testing / assessment • Configuration controls 11
  • 12. #RSAC Defend the System as a Whole  Visibility into current and historical system activity  Manageability of system configuration, updates, and control settings  Survivability to deliver services through attack, detection, and recovery 12
  • 13. #RSAC Designing for Defense 13  Visibility  Server logging  Workstation logging  Network monitoring  Cardstock inventory  Insider detection Provisioning Credentialing PKI Interface Physical Security HR Interface Critical Roles: Role A Role X Service Acct
  • 14. #RSAC Designing for Defense 14  Visibility  Manageability  Rules based on new threat intel  Control points for tactical mitigations  System patching  Controlled admin access Provisioning Credentialing PKI Interface Physical Security HR Interface Critical Roles: Role A Role X Service Acct
  • 15. #RSAC Designing for Defense 15  Visibility  Manageability  Survivability  System segmentation  Strong admin authentication  Separate card use from issuance  Assured system recovery Provisioning Credentialing PKI Interface Physical Security HR Interface Critical Roles: Role A Role X Service Acct
  • 16. #RSAC 16 System Threat Analysis Threat Intelligence Use IDDIL/ATC to select protection and appropriate compensating controls Design the system to be defended through visibility, manageability, and survivability
  • 17. #RSAC Building Defendable Architectures and Applying Threat-Driven Methodologies 17 Start identifying your organization’s critical systems and assets Use IDDIL/ATC to select protection and appropriate compensating controls Design the system to be defended through visibility, manageability, and survivability For the next system you build, modify, operate, or assess Integrate threat intelligence into design, development, and operations As your cyber defense capabilities mature