Basic Concepts of Access Control, Identification and Authentication
Basic Concepts of Access Control, Identification and Authentication
and Authentication
1
Session Overview
2
1. Access Control
Introduction
3
Access Control (1 of 3)
4
Access Control (2 of 3)
Access control is performed by selectively restricting access to an
information system, such as a
– Network
– Physical location
5
Access Control (3 of 3)
7
Identification (1 of 3)
8
Identification (2 of 3)
9
Identification (3 of 3)
• Person to computer
– PC, server or other system
• Computer to person
• Computer to computer
10
3.Authentication
11
Authentication
12
Authentication
13
Authentication – Knowledge factor
14
Authentication – Knowledge factor: How it works
Step 2. Verify
Step 1. Username: Alice; Password: MyLittleSecret
against local
database
Username:
Step 3. ACK/NAK: Authentication Accepted or Refused Alice
Password:
MyLittleSecret
….
15
Authentication – Knowledge factor: How it breaks
The simple password authentication protocol is not secure, and is
vulnerable to:
1. Eavesdropping on the communication channel
2. Replaying what the user communicated
3. Keylogger on user PC
4. Malware sniffing on the user computer
5. Dictionary and brute force attacks
16
Authentication – Ownership factor
• Magnetic stripe card
• Smart card
– A card containing an integrated circuit enabling the storage and processing
of small amount of data; Can store and use cryptographic keys
– Contact or contactless (through Radio-Frequency induction)
– SIM (Subscriber Identity Module) card, EMV credit cards are examples
• RFID – Radio Frequency Identification
– Similar technology to contactless smart cards, but less processing power
and less memory
• Hardware tokens
• Secret cryptographic key on a computer
17
Authentication – Inherence factor
• Behavioral
– Ex. Voice recognition, typing rhythm.
18
4. Session Summary
19
Session Summary
20
Session Summary
21
End of Session
22
Basic Concepts of Audit Trail
1
Session Overview
2
Audit Trail
3
1. Definition of an Audit Trail
4
1. Definition of an Audit Trail
5
2. Audit Trail Usage
As with many other information security controls, access control is
complemented with audit tails (security logging).
6
3. Types of Logs
8
5. Content of a Log
9
Important Considerations for Audit Trails
• Availability: The period of time for which the audit trail must
be available will depend on the nature of logs and specific
requirements.
• Integrity: Mechanisms must be put in place to assure the
integrity of audit trails (requirements of auditors, court cases)
10
Example log
11
6. Session Summary
12
Session Summary (1 of 3)
13
Session Summary (2 of 3)
An audit trail includes all or a subset of the following:
- Application logs
- Database logs
- Operating system logs
- Access logs on Web servers
- Network logs
14
Session Summary (3 of 3)
Each event log should include the Who, What, When, Where:
– The subject involved, or actor
– The operation done, the action
– A timestamp
– The system and resource that has been accessed or modified
– Any additional detail
15
End of Session
16
Basic Concepts of Authorization
1
Session Overview
1. Authorization
1. Definition of authorization
2. Subject, operations and objects
3. Access control models
2. Security issues with improper authorization
3. Session Summary
2
1. Authorization
3
1.1 Definition of Authorization
4
1.2 Subject, Operations and Objects
5
1.3 Access Control Models (1 of 2)
6
1.3 Access Control Models (2 of 2)
7
2. Example of Security Issues with Improper
Authorization
8
Société Générale Trading Loss (1 of 4)
9
Société Générale Trading Loss (2 of 4)
10
Société Générale Trading Loss (3 of 4)
• After working at the bank for 5 years, Kerviel moved from back
office to front office and became an arbitrage trader
11
Société Générale Trading Loss (4 of 4)
• Kerviel would buy financial instruments A without selling similar
instruments B, taking a directional position that is opposite to the
risk mitigation policy and the role of an arbitrage trader.
12
3. Session Summary
13
Session Summary
14
End of Session
15
Authentication
Based on Inherence
1
Session Overview
2
1. Authentication Schemes Based on Inherence
3
1.1 Inherence Factors
• Physiological
– Fingerprint
– Facial recognition
– Iris / Retina
– DNA
• Behavioral
– Voice recognition
– Typing rhythm
This Photo by Unknown Author is licensed under CC BY
4
1.2 Biometric Authentication
Biometric authentication uses measurements of special characteristics of
an individual, which are read and compared to a reference record
Source:Ritam Dutta, Papri Ghosh, A New Approach Towards Biometric Authentication System in Palm Vein Domain, March 2012
5
1.3 Fingerprint Based Authentication
Minutiae are the points where
friction ridges begin, terminate, or
split.
6
1.4 Common Biometric Attributes Used in Authentication
Biometric attribute: Fingerprint Facial Iris Voice
Working Recognizes minutiae Analyzes unique From an infrared Analyzes the rhythm,
details against a shape, patterns and picture, recognizes tone and pitch of a
measurement positioning of facial striations, pits and voice and possibly
tremplate . May add features that are furrows against a other characteristics
temperature mapped (2D or 3D) measurement
monitor. template.
Vulnerabilities Use of 3-D molds Use of photographs Synthetic iris image Recording devices
or video material cannot perfectly
reproduce the
characteristics of the
vocal tract.
However, an
individual’s voice can
change with age and
other factors
7
2. Vulnerabilities
8
2.1 Vulnerabilities with Fingerprint
Flushed with his success, he took latent fingerprints from a glass, which he enhanced with a
cyanoacrylate adhesive (super-glue fumes) and photographed with a digital camera. Using
PhotoShop, he improved the contrast of the image and printed the fingerprint onto a
transparency sheet.
From this he made a gelatine finger using the print on the PCB, using the same process as
before. Again this fooled fingerprint detectors about 80 per cent of the time.
Source: John Leyden, The Register, 16 May 2002
9
3. Session Summary
10
Session Summary (1 of 3)
11
Session Summary (2 of 3)
12
Session Summary (3 of 3)
13
End of Session
14
Authentication
Based on Knowledge
1
Session Overview
2
1. Authentication Schemes Based on Knowledge
3
1.1 Knowledge Factors
4
1.2 Password Based Authentication
Step 2. Verify
Step 1. Username: Alice; Password: MyLittleSecret
against local
database
Username:
Step 3. ACK/NAK: Authentication Accepted or Refused Alice
Password:
MyLittleSecret
….
5
1.3 Password Digest
• A more secure way to store a password is to transform it into
data that cannot be converted back into the original input
• A cryptographic hash function or symmetric encryption
algorithm can be used with a salt and in iteration
– Slow down computation time by using CPU or memory
• Common password digestion algorithms are
– Bcrypt
– Scrypt
– PBKDFv2
– Argon2
6
1.4 Protecting the Password in Transit
7
2. Vulnerabilities
8
2.1 Shoulder Surfing
Shoulder surfing
– Spying over someone’s
shoulder in order to steal
personal authentication data
such as a PIN, password,
passphrase or answer to a
secret question
9
2.2 Keyloggers and Malware
Keyloggers
• A keylogger or
keystroke recorder is
software or
hardware that
records the
keystrokes of a user,
typically covertly
• Various malware
implement a
keylogger function Source: amazon.ca
10
2.3 Phishing & Social Engineering
Phishing
- Type of social engineering in
which an attacker sends a
fraudulent message with the
objective to trick the victim in
revealing sensitive information
such as authentication
credentials
- Different social engineering
schemes in general can be used
to obtain authentication
credentials
This image by unknown author is used under CC BY-SA-NC
11
2.4 Password Crackers
A password cracker is a tool that allows the user to discover the cleartext
password associated to a password digest
Methods include:
- Dictionary attack: Trying each and every password from a list of passwords
(dictionary), possibly with certain variations
- Brute force: Trying each and every possible password among all possible
combinations respecting a certain policy
- Rainbow attack: Uses "rainbow tables" which are pre-computed hashes
that allows to accelerate an attack using time-memory trade-off
12
3. Session Summary
13
Session Summary (1 of 2)
• Authentication schemes based on knowledge use some sort of
secret known by the user: PIN, password, passphrase, secret
answer
• The simple password based authentication protocol is subject
to several vulnerabilities
• A password digest is a transformation of the cleartext password
so that it cannot be converted back
– Use of a salt and iterations to slow down an attack
• In transit a password can be protected with the use of
encryption or a nonce in a challenge protocol
14
Session Summary (2 of 2)
15
End of Session
16
Authentication
Based on Ownership
1
Session Overview
2
1. Authentication Schemes Based on Ownership
3
1.1 Ownership Factors
4
1.2 Magnetic Stripe Cards
Track 1 :
%B_Primary Account Number_^_Name_^_
Expiration date YYMM_^_CVV or other discr data_?_LRC
Track 2:
;_PAN_=_Expiration date YYMM_3 digit Service code_
Discretionary data_?_LRC
5
1.3 Smart Cards
Integrated circuit cards that come
in two types:
• Memory cards
• Microprocessor cards
6
1.4 GSM Authentication with SIM Card
Global System for Mobile communications (GSM)
Source: Figure 2.10 from Introduction to Computer Security, M T. Goodrich & R. Tamassia
7
1.5 Hardware Tokens
A hardware token, usually in the
form of a credit card or a keychain
fob, with memory, processing
power and a digital display.
8
1.5 Cryptographic Key
A secret or private cryptographic
key stored on a device
- Examples:
- Secure Shell (SSH)
- Secure Socket Layer (SSL)/
Transport Layer Security (TLS)
9
2. Vulnerabilities
10
2.1 Vulnerabilities
Loss or theft
Skimming
Vulnerabilities in cryptographic
protocol or algorithms
11
2.2 Card skimming
Source: https://www.engadget.com/2014-07-28-credit-card-skimming-explainer.html
12
2.3 Vulnerabilities in Cryptographic Protocols
13
3. Session Summary
14
Session Summary (1 of 2)
• Authentication schemes based on ownership factor rely on
something the user has or owns, such as: magnetic stripe card,
chip card, hardware token or cryptographic key stored on a
device
• Magnetic stripe cards store authentication data on tracks
• These are vulnerable to card skimming
• Smart cards are integrated circuit cards that come in two types:
memory cards and microprocessor cards. These can securely
store a cryptographic secret used in an authentication protocol
• Smart cards can be contactless with RFID / NFC technology
15
Session Summary (2 of 2)
16
End of Session
17
Cryptographic
Challenge-Response
Protocols
1
Session Overview
2
1. Cryptographic Challenge-Response
3
1.1 Concept
Claimant will demonstrate knowledge of a secret without revealing the secret
itself
4
1.2 Challenge Based on Timestamp
Generation
Verification
Seed / Secret Key
Encryption
/ One way Authentication Code
Time +/- interval function
5
1.3 Challenge Based on Randomness (1 of 2)
GSM – SIM example
Source: Figure 2.10 from Introduction to Computer Security, M T. Goodrich & R. Tamassia
6
1.3 Challenge Based on Randomness (2 of 2)
SSL Handshake
Source: W. Stallings, “SSL: Foundation for Web Security”, Bd. 20, 1998.
7
2. Session Summary
8
Session Summary
• Cryptographic challenge-response protocols are based on a
shared secret and a time-variant parameter
• Can be based on a timestamp, sequence value or random value
• Hardware authentication tokens display a code that is the
result of the cryptographic transformation of a seed (shared
secret key) and the current timestamp
• Several common authentication protocols, such as used in GSM
and SSL/TLS will use a cryptographic challenge-response
protocol based on a shared secret key or a public key certificate
and a random value
9
10
Password Digest and
Key Stretching
1
Session Overview
2
1. Password Digest Functions
3
1.1 Simple Password Digest
Hello 4149da18aa8bfc2b1e382c6c26556d01a92c261b6436dad5e3be3fcc
4
1.2 Password Digest Entries
username hash
alice 4420d1918bbcf7686defdf9560bb5087d20076de5f77b7cb4c3b40bf46ec428b
jason 695ddccd984217fe8d79858dc485b67d66489145afa78e8b27c1451b27cc7a2b
mario cd5cb49b8b62fb8dca38ff2503798eae71bfb87b0ce3210cf0acac43a3f2883c
teresa 73fb51a0c9be7d988355706b18374e775b18707a8a03f7a61198eefc64b409e8
bob 4420d1918bbcf7686defdf9560bb5087d20076de5f77b7cb4c3b40bf46ec428b
mike 77b177de23f81d37b5b4495046b227befa4546db63c
Source: https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/
5
1.3 Salt
Hello 4149da18aa8bfc2b1e382c6c26556d01a92c261b6436dad5e3be3fcc
6c39e274Hello dc942eb043ee30a6e73ed7227fd74775f2683a7680ac7d87f9be45ee
6
2. Key Stretching Algorithms
7
2.1 PBKDF
Salt || Password
HMAC Digest
Iterations
8
2.2 Bcrypt
BCrypt
9
2.3 Other Key Stretching Algorithms
- Scrypt
- uses a large vector of pseudorandom bit strings as part of the algorithm in
order to require more memory usage.
- This makes hardware implementations more expensive, and less likely to be
accelerated using specialized hardware (ex. ASIC and FPGA)
- Argon2
- specifically designed to avoid acceleration from GPU
- winner of the password hashing competition in 2015
10
3. Session Summary
11
Session Summary
• Adding a ‘salt’ to a password before hashing protects the
password digest from revealing 2 accounts that have the same
password
• Adding ‘iterations’ to the hashing process will slow down a
dictionary of brute force attack
• Common password digest algorithms are: PBKDF2, Bcrypt,
Scrypt and Argon
• Scrypt and Argon are designed to use more memory and avoid
the possibility to accelerate a dictionary or brute force attack
thru the use of specialized hardware
12
End of Session
13
Review of Cryptographic
Fundamentals
1
Session Overview
1. Symmetric Encryption
2. Asymmetric Encryption / Public Key Cryptography
3. Cryptographic Hash Functions
2
1. Symmetric Encryption
3
1.1 Encryption
4
1.2 Symmetric encryption
P E C C D P
K K
5
1.3 Standard symmetric encryption algorithms
6
1.4 Modes of operation
Source: https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation
7
1.5 ECB is Not Secure
Source: https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation
8
2. Asymmetric Encryption
9
2.1 Asymmetric Encryption
Instead of using a shared secret, there are two separate keys:
• A public key, Kpub used to encrypt a message. The public key is
PUBLIC, and can be seen and used by anyone
• A corresponding private key, Kpriv, which must remain private, and is
used to decrypt a message encrypted with the corresponding public
key
Kpub Kpriv
This key, This key, has to
anyone can see be kept secret!
10
2.2 Standard Symmetric Algorithms
11
2.3 Secret Key Exchange Using Public Key Encryption
Step 3 C
Kpriv_Bob
Step 1 Pick a random secret symmetric key K Step 4 Alice and Bob now share a secret
key K
Step 2 Lookup Bob’s public key Kpub_Bob
K E C C D K
Kpub_Bob Kpriv_Bob
12
3. Cryptographic Hash Functions
13
3.1 Cryptographic Hash Function
A hash function is a mathematical
function that takes a message of
arbitrary length, and efficiently
outputs a message of fixed length,
called a digest.
14
3.2 Hash Digest
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse a nulla
placerat, accumsan augue sed, lobortis odio. Donec faucibus metus eu augue
dignissim, ut efficitur est finibus. Vivamus rutrum urna nibh, quis ornare ligula
venenatis sed. In consectetur felis sit amet dapibus aliquet. Nam malesuada mi
nec lobortis iaculis.
15
3.3. Properties
A cryptographic hash function is a hash function with the following
properties:
• Pre-image resistance: Given a random digest, it is unfeasible to
determine a message that produces that digest
– Given y, hard to find x such that H(x) = y
• Second-pre-image resistance: Given a random message, and the
corresponding output of the hash function, it is unfeasible to find a
second message that outputs the same hash value
– Given x, and y = H(x), hard to find x’ ≠ x such that H(x’) = y
• Collision resistance: It is unfeasible to find any two distinct
messages that produce the same digest
– Hard to find x and x’, such that x’ ≠ x and H(x) = H(x’)
16
3.4 Standard Cryptographic Hash Algorithms
17
4. Session Summary
18
Session Summary (1 of 3)
• An encryption algorithm transforms a plaintext into a
ciphertext using an encryption key
• A corresponding decryption algorithm allows to decrypt a
ciphertext into a plaintext using a decryption key
• Symmetric encryption algorithms use the same secret key for
encryption and for decryption
• AES is presently the most common symmetric encryption
algorithm, using a key of 128, 192 or 256 bits
• CBC, CFB and OFB are common and secure block cipher modes
of operations
19
Session Summary (2 of 3)
20
Session Summary (3 of 3)
21
End of Session
22
Authorization
1
Session Overview
1. Authorization
2. Access Control Matrix
3. Access Control List
4. Session Summary
2
1. Authorization
3
1.1 Concept
4
1.2 Terminology
A privilege is a permission to
perform an operation on an object.
5
2. Access Control Matrix
6
2.1 Access Control Matrix
7
2.2 Access Control Matrix - Limitations
The main disadvantages of an
access control matrix is its size.
Example:
On a system that has 1,000 subjects
and 1,000,000 objects, the matrix
will have 1 billion entries!
8
3. Access Control List
9
3.1 Access Control List
An access control list (ACL) model defines for each object O, a list L
that enumerates all subjects along with their privileges on O.
The ACL of an object can be stored directly with the object as part
of its metadata.
10
3.2 Access Control List - Limitation
The main disadvantage with ACLs is
that they don’t provide for an
efficient way to enumerate all of
the privileges of a given subject:
11
4. Session Summary
12
Session Summary
• An access control model provides a formal representation of
authorization rules.
• An access control matrix is a model that represents access privileges
in a matrix, with the first column representing the list of subjects
and the first row representing the list of objects. Each entry defines
the access privileges of a subject on an object.
• The main limitation of an access control matrix is its size.
• An access control list defines, for a given object, the list of subjects
and their access rights on the given object.
• An access control list is a column in an access control matrix.
• Its main disadvantage is the complexity to search all access rights
associated to a subject.
13
End of Session
14
Role Based Access Control and
Attribute Based Access Control
1
Session Overview
Duration:
2
1. Role Based Access Control (RBAC)
3
1.1 RBAC
The privileges of a given subject are given by the union of the privileges of the
roles that are assigned to the subject.
4
1.2 RBAC Example
5
2. Attribute Based Access Control (ABAC)
6
2.1 ABAC
7
2.2 ABAC Example
8
3. Session Summary
9
Session Summary
10
End of Session
11
Digital Identity and Blockchain
1
Session Overview
1. Digital Identity
2. Review of Bitcoin and blockchain
3. Blockchain for digital identity
Duration:
2
1. Digital Identity
3
1.1 Digital Identity
The set of digital attributes that are
associated to an entity.
Examples:
• Name, surname
• Government ID
• Banking ID
• Academic credentials
• Login credentials & biometrics
• Web surfing habits
• Social media attributes
• Other attributes
4
2. Review of Bitcoin and Blockchain
5
2.1 Bitcoin
6
2.2 Blockchain
The blockchain is the underlying
technology of Bitcoin, Ethereum and
Litecoin
7
2.3 Transaction
Transaction
Alice Bob
Transaction element 1
Transaction element 2
Signature Transaction from Alice to
algorithm Bob Kpub_Bob
Transaction element 3
Transaction element n
Kpriv_Alice
8
2.4 Transactions in a Block
x BTC H
Difficulty
9
3. Blockchain for Digital Identity
10
4.1 Traditional Digital Identity
11
4.2 Digital Identity on Blockchain
• On a Blockchain, the public keys serve as identifiers, they are called
DIDs (Decentralized Identifiers);
• A qualification or credential can be issued as a transaction on the
blockchain: The issuer uses their digital signature to provide a
credential to a recipient, identified by its DID
credential
verification
Blockchain /
distributed ledger
12
Session Summary
13
Session Summary
• A digital identity consists of the set of digital attributes associated to an entity
• Bitcoin is an electronic payment system that is decentralized, cryptographic,
scarce, verifiable and irrevocable.
• A Bitcoin transaction is an electronic signature that is recorded on the
Blockchain. The public key serves as the identifier of the entity involved in the
transaction.
• Ethereum and Litecoin also use Blockchain, a distributed general ledger
• A blockchain is a series of interconnected blocks, each containing a cryptographic
hash of the previous block, a timestamp and transaction data. These blocks are
immutable.
• A blockchain can be used to record electronic payments, and more generally any
type of digital data
• Blockchain can be used to implement digital identity. The public keys serve as
identifiers (decentralized identifiers (DID)).
14
15
Cloud Identity and Access Management (IAM)
Solutions
1
Session Overview
Duration:
2
1. Cloud IAM Solutions
3
1.1 Introduction
• Historically, IAM solutions have
been implemented on-prem
using directory services such as
Microsoft AD of OpenLDAP
• Cloud IAM solutions help
organizations speed up
deployment and maintenance
4
1.2 Cloud IAM Features
Most Cloud IAM solutions will offer the following features:
• Identity provisioning
• Single access control point for all cloud services
• Single sign-on (SSO)
• Multi-factor authentication (MFA)
• Risk-based authentication
5
1.3 Pros and Cons
6
Session Summary
7
Session Summary (1 of 2)
• Historically, IAM solutions have been implemented on-premise, mostly
with directory services such as Microsoft AD and Open LDAP
• With the advent of cloud computing, several cloud-based IAM solutions
offer faster to deploy, scalable and reliable IAM solutions
• Most cloud IAM solutions offer identity provisioning, a single access
control point, SSO, MFA and Risk-based authentication
8
Session Summary (2 of 2)
• Some of the benefits of a cloud IAM solution includes faster
deployment, no patching of upgrading, high availability and scalability,
integration with cloud applications and a high level of security
• Cons include the fact that a cloud IAM solution is a single point target for
cybercriminals, and difficulty to integrate legacy applications in hybrid
environments
9
10
Federated Identity Management
1
Session Overview
2
1. Federated Identity
3
1.1 The Problem
Organization A Organization B
Applications Shared
Application
4
1.2 Federated Identity Management
• The Identity Provider (IdP) is the
system entity that provides the
authentication assertions
• The service provider (SP) is the
entity that provides the shared
service and verifies the
authentication assertions
• The authentication assertions are
in the form of a token or ticket
• Technologies include SAML,
Oauth, OpenID, JSON Web
Tokens (JWT), etc..
• Allows for SSO
5
1.3 Oauth 2.0 Access Token (1 of 2)
• An Oauth access token is a string
representing an authorization
issued by an IdP to a subject
• Includes specific scope and
duration of access granted by the
resource owner and enforced by
the service provider
• May denote an identifier used to
retrieve the authorization
information or may self-contain
the authorization information
• Cryptographically signed
Source: https://darutk.medium.com/oauth-access-token-implementation-30c2e8b90ff0
6
1.4 Oauth 2.0 Access Token (2 of 2)
Source: https://darutk.medium.com/oauth-access-token-implementation-30c2e8b90ff0
7
Session Summary
8
Session Summary
• Federated identity solves the problem of authenticating subjects of a
security domain A that are accessing resources in a distinct security
domain B, without needing to share the subjects authentication
credentials
• Federated identity management uses authentication assertions in the
form of a ticket or token that are generated by the identity provider IdP
and verifiable by the service provider SP
• Examples of technologies that implement these concepts include SAML,
Oauth, OpenID, JSON Web Tokens (JWT)
• Oauth 2.0 access token is a string that represents authorization and
includes a scope and duration. It can include an identifier used to
retrieve the authorization information or it can be self-contained. They
are verifiable.
9
10
Cyber Attack Models
1
Session Overview
2
1. Cyber Attack Models
3
1.1 Introduction
• A cyber attack model represents
the different steps or sequences
of events involved in an attack on
an IT environment
• Useful for:
– Developing strategies and controls
to detect, stop and contain a cyber
attack
– Testing existing security controls:
ex. preparing a Red Team
– Analyzing and remediating a
security incident
4
1.2 Cyber Kill Chain
Source: https://www.techtag.de/it-und-hightech/it-security/cyber-kill-chain-it-infrastruktur/
5
1.3 Other Models
Cyber Kill Chain MITRE ATT&CK Diamond Model
Reconnaissance Reconnaissance
Weaponize Resource development
Deliver Initial access
Exploit Execution
Install Persistence
Command &
Privilege escalation
control
Defense evasion
Credential access
Discovery
Lateral movement
Collection Source: http://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdfe.org
6
2. MITRE ATT&CK Model
7
2.1 ATT&CK
• ATT&CK
– Adversarial Tactics, Techniques &
Common Knowledge
– Tactics are the adversary’s
objectives – the “why”
– Techniques are the “how”
• ATT&CK Navigator
– Can be used to browse and
annotate the ATT&CK matrix and
view techniques associated to
threat groups or software
Source: https://www.mitre.org/
8
2.2 WannaCry Example
9
2.3 Techniques
10
2.4 Procedures and Mitigations
11
Session Summary
12
Session Summary
• A cyber attack model represents the different steps or sequences of
events involved in a cyberattack
• Can be used to develop strategies and controls to detect and mitigate
cyberthreats, to plan the testing of existing controls or to facilitate the
analyses and remediation of a security incident
• The Cyber Kill Chain is one of the first such models
– Recon; Weaponize; Deliver; Exploit; Install; C2; Actions
• ATT&CK is a more recent model that expands on the steps and
represents in a matrix the different tactics and specific techniques used
– Based on a common knowledge
– The ATT&CK navigator can be used to browse and annotate the matrix
13
14
Preventive and Detective Controls
1
Session Overview
2
1. Preventive vs Detective
3
1.1 Introduction
Preventive controls aim at stopping Detective controls aim at identifying
a threat and preventing an incident a threat in action and responding
• Focus on reducing the probability of a • Focus on detecting and responding rapidly
successful attack • Compensates inefficiencies of preventive
• Better than responding controls
• Does not require a high level of • Not if you get breached but when
knowledge corresponding to identifying • Response to fast evolution of threats
an intrusion • Ex. SIEM, EDR
• Ex. Patching, firewall, antivirus
4
2. Technological Controls
5
2.1 System Hardening P
System hardening is the process of
securing a system by reducing its
surface of vulnerabilities.
This includes
- Removing unnecessary software
and services
- Modifying configuration to
heighten security
- Changing default passwords and
removing unnecessary accounts
6
2.2 Vulnerability and Patch Management P
Source: https://security.gatech.edu/vulnerability-management
7
2.3 Antimalware P
• Antimalware is software used to
scan, detect and remove malware.
• Initially developed to defend
against computer viruses, now
evolved to protect against Trojan
Horses, ransomware, adware and
spyware and other forms of
malware
• Signature-based vs heuristic-based
(static or dynamic (sandboxing)) vs
behavior-based
8
2.4 Endpoint Detection and Response (EDR) P D
• EDR is an evolution of
antimalware
• Includes antimalware function
with additional features:
– Continuous gathering and
storage of events for further
analyses or investigations
– Prompts user with a preventive
list of actions or can
automatically isolate the
endpoint
– Makes use of AI
– Mostly lightweight agents
9
2.5 Firewall P
A Firewall is a system that aims at
protecting computers and networks
by filtering incoming and outgoing
traffic based on a predefined set of
rules
10
2.6 Intrusion Prevention System P D
An intrusion prevention system (IPS) is a
network threat prevention tool that
monitors network traffic in order to
detect and prevent vulnerability exploits.
11
2.7 Web Application Firewall (WAF) P D
A WAF monitors traffic between a web application and the Internet.
Source: https://cutcopywaste.com/elizabethville/what-is-web-application-firewall.php
12
2.8 Data Loss Prevention P D
DLP solutions identify potentially
sensitive data based on a policy,
content and context, and adopts
remediation actions in order to
prevent the loss, leakage or misuse
of data.
13
2.9 Security Information and Event Management D
A SIEM is a software solution that
aggregates events from various
systems across a network and offers
real-time analysis and alerting.
14
2.10 UEBA, NTA, XDR P D
• User and Entity Behaviour Analytics (UEBA): Monitors and analyses
traffic patterns from users and entities, compared to a baseline
• Network Traffic Analytics (NTA): Monitors and analyses all traffic flows
• Both types of solutions are based on AI and machine learning, advanced
analytics and rule-based detection
• XDR
• X stands for Any Data source
• Combines EDR, UEBA and NTA in a single solution
15
Session Summary
16
Session Summary (1 of 5)
• Preventive controls aim at stopping a threat and preventing an incident
by reducing the probability of a successful attack.
– These controls generally do not require a high level of knowledge with regards to
identifying an intrusion
• Detective controls focus on detecting and responding rapidly to
incidents. They compensate the inefficiencies of preventive controls and
requires knowledgeable staff.
• Both types of controls must be combined in a cyber defence strategy.
17
Session Summary (2 of 5)
• System hardening focuses on reducing its vulnerability surface by
removing unnecessary software and services, modifying configuration
and changing default passwords and unnecessary accounts.
• Vulnerability management is the process of discovering assets within a
network and identifying security vulnerabilities.
• It is complemented by patch management which consists of updating
operating systems and software running on it.
• At a high level of maturity, all threat vectors are periodically scanned and
prioritized, patching is continuous and key performance indicators are
integrated to enterprise risk management.
18
Session Summary (3 of 5)
• Antimalware is software that will scan, detect and remove malware.
• It is signature-based, with some solutions offering heuristic analysis,
either static (analysis of code) or dynamic (executing code in a sandbox
environment), or behavior-based (analysis of certain events).
• EDRs are an evolution of antimalware, with continuous gathering and
storage of events, and make use of artificial intelligence.
• They are mostly in the form of a lightweight agent installed on endpoints
and prompt users with preventive actions or can automatically isolate an
endpoint.
19
Session Summary (4 of 5)
• A Firewall protects computers and networks by filtering
incoming and outgoing traffic based on a predefined set of
rules.
• An IPS monitors network traffic in order to detect and prevent
vulnerability. It can block or send an alert. The analysis is
signature-based or behaviour-based (statistical anomaly
detection).
• A WAF works like an IPS but is specific to HTTP traffic. It can
detect SQL injection, Cross-site scripting (XSS) and file inclusion
attacks.
20
Session Summary (5 of 5)
• DLP solutions identify potentially sensitive data based on a policy,
content and context, and adopt remediation actions.
• They are specific to endpoint, storage, network or cloud.
• A SIEM aggregates events from various systems across a network
and offers real-time analysis and alerting based on correlation
rules. It also consolidates security logs for compliance and audit
purposes.
• UEBA monitors and analyses traffic from user and entities
compared to a baseline. NTA does the same for all type of network
traffic. They use AI and machine learning, advanced analytics, and
rule-based detection.
• An XDR combines the functions of an EDR, UEBA and NTA.
21
22
Audit Logs and Security Monitoring
1
Session Overview
1. Audit Logs
2. Security Monitoring
2
1. Audit Logs
3
1.1 Audit Logs
An audit log (or audit trail), is a record
of events and activities.
4
1.2 Advantages of an Audit Log
5
1.3 Fields of a Log Event
Who, What, When, Where and any
additional information that is
relevant.
6
1.4 Example Event Log
Additional
information
Source
(application,
computer)
Action Date/time
(Windows
Event ID
1001 is an
Subject
error code)
(user)
Source: https://www.ictshore.com/php/install-php-on-windows/attachment/php0001-05-windows_event_viewer/
7
2. Security Monitoring
8
2.1 SIEM
9
2.2 SIEM Capabilities
Log Management: Collection and aggregation of event logs from various
sources, including network devices, desktops, servers, operating systems,
middleware, database management systems, applications, etc..
Retention: Long-term storage necessary for threat hunting, forensics and
compliance
Normalization: Transformation of the various standards into a uniform
format for processing
Correlation and analysis: A variety of correlation techniques to integrate
the information from various event logs
Alerting: Notification of certain correlated events
Reporting: Visualisation of alerts and informational charts
10
2.3 SIEM Architecture
11
2.4 SIEM Use Cases
Source: Swift, David (2010). "Successful SIEM and Log Management Strategies for Audit and Compliance". SANS Institute.
https://en.wikipedia.org/wiki/Security_information_and_event_management
12
Session Summary
13
Session Summary (1 of 2)
• An audit log (or audit trail), is a record of events and changes
• Different standards exist, the most popular are Syslog, Windows Event
Log, and JSON log formats
• Can be generated by various devices and systems in a network
• Used for security monitoring, troubleshooting and performance
monitoring, incident investigation, risk management and compliance
• Every event log should minimally include Who (subject), What (action),
When (datetime), Where (source) and any additional information
14
Session Summary (2 of 2)
• Security monitoring is acheived using a SIEM
– SIM for long-term storage of log events, analysis and reporting
– SEM for Real-time monitoring, correlation of events and alerting
• SIEM capabilities include log management, retention, normalization,
correlation and analysis, alerting and reporting
• A typical SIEM architecture includes forwarding log events from various
devices to a collector or aggregator, an analysis tier that applies
correlation rules, storage of logs, alerting and a presentation layer
• Various security monitoring use cases can be defined based on defined
rules on event sources with defined triggers to achieve monitoring goals
15
16