Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Building Valid Threat Libraries for Cloud Based...

Building Valid Threat Libraries for Cloud Based Applications

VerSprite, Inc

July 06, 2018
Tweet

More Decks by VerSprite, Inc

Other Decks in Technology

Transcript

  1. Author name her 1. Threat Modeling activities lend well to

    DevSecOps stages i. Threat Library builds context of applicable menaces to Cloud application based upon industry, data model, and technology footprint. Blueprints attack patterns to test, vulns to check, controls to configure 2. Correlating Threat Libraries to build security controls in DevOps is possible. i. Threats → Attacks → Vulns → Affected Components → Controls for Automation 3. Fosters security automation in Building, Test, Release, Deploy, & Operate phases. i. Threat Modeling (PASTA S1-S4) → Plan stage ii. Risk based Countermeasure Development (PASTA S7) → Code, Build, Deploy iii. Vulnerability Analysis (PASTA S5 → Deploy (Configuration), Operate iv. Threat Analysis (PASTA S4 → Operate (Monitoring), Plan) Leverage a Threat Model to guide DevSecOps Tony UcedaVelez // @t0nyuv Talk Objectives Source: metalop.com
  2. Author name her • CEO/ Founder, VerSprite (www.versprite.com) – Global

    Security Firm • OWASP Atlanta Chapter Leader (past 10 years) • Author, “Risk Centric Threat Modeling – Process for Attack Simulation & Threat Analysis”, Wiley June 2015 • Passionate global, threat modeling evangelist • ~25 years of diverse IT/ Security experience in software development, architecture, pen testing, threat modeling, sys admin, security operations • Dreams of bankrupting #infosec with intelligent, threat inspired DevSecOps automation • @t0nyuv • www.linkedin.com/tonyuv • [email protected] • https://versprite.com/security-resources/blog/ Bio & Background Tony UcedaVelez // @t0nyuv Speaker Background
  3. Threat Considerations & Misinterpretations Basic Tenants of Threat Libraries in

    Cloud Threat Models “Cloud security automation can leverage threat models as blueprints; threat libraries that leverage both threat intel & data help kickoff evidence based DevSecOps security workflows”
  4. Problem & Resolutions on Today’s Threat Models Many threat modeling

    activities are foregoing the inclusion of threat considerations. • Vulnerabilities ≠ Threats; DFDs ≠ Threat Models • Since vulnerabilities do map to exploits, many equate exploits or attack patterns to threats • Practitioners compelled to only look outwardly to threat intel vs. leveraging threat data • AWS & Azure both provide centralized ‘dashboard’ of security threats, however, still overwhelming to look at. • Azure Security Center (now Hybrid) facilitates alerts per tenant. • Means Energy, Transportation sectors dependent on SaaS vendors for efforts between threat identification to mitigation. Problem Statement: Threat Models are Not Addressing Cloud Related Threats Proposed Resolution: Help Substantiate your Threat Model w/ Threat Data & Customer Threat Intelligence Important to substantiate your threats for your Cloud threat models • Threat intelligence provides outside, industry threat perspectives • However threat data provides security events/ incidents that may support threat claims in a threat model • Threat data can substantiate underlying attack patterns in a threat model • SME/Security Champion conducting threat modeling can leverage threat intel and data Tony UcedaVelez // @t0nyuv Cloud, Threat Confusion, Misuse Impairs Ability to Model Threats
  5. • Threat modeling should represent “Model of Threats” • Threat

    model can serve as blueprint for DevSecOps efforts across the FULL Cloud stack. • Remember Cloud can be SaaS, PaaS, IaaS, CaaS; Cloud is not just serverless apps, containers, or VMs. • Today, threats are often inferred from Attack Surfaces or Vulnerabilities. • Threats should point to viable attack patterns that can automated via automated testing. • Example: Crypto mining threat (aka cryptojacking) via priv escalation attack to instantiate new EC2 instance • “Threat Hunting” has completely perversed the use of threat intelligence. • Reboot & refactor needed to iteratively feed threat models. • Threat data may represent lessons learned from prior battles/ attacks logged in Cloud management logs, VMs, serverless apps Clarifying Threat Terms Use & Abuses Tony UcedaVelez // @t0nyuv Threats Against Cloud Castles – Key Threat Modeling Points to Consider
  6. PASTA Methodology applied to Cloud 7 • PASTA applies to

    the full stack, not just the App tier • Stage I sets tone of importance around Cloud use cases, particularly in Energy sector where use cases can be baselined in Cloud Apps/ Management APIs • Stage II defines technical scope of app components; essentially can provide attack surface across full stack in CSP. • Stage III maps use cases to actors/ worker processes and data sources in Cloud. Helps in IAM Cloud policy configuration via Cloud Mgt APIs. • Stage IV correlates relevant threat patterns. Threat intelligence and threat data fed. (Key focus of talk). • Stage V & VI – “proof” stages; prove viability; allow for integrated security testing in threat- led DevSecOps efforts • Stage VII – Rationale for countermeasure development based upon residual risk can be incorporated into Design & Build phases of DevSecOps lifecycle. • Model is fed by Operate & Monitor phases in DevSecOps
  7. Tiered Approach to PASTA DevSecOps Adoption Tony UcedaVelez // @t0nyuv

    Scoping Cloud API PUTS & GETS Supports Evidence Driven Model Blind Threat Model •Industry ‘Best Practice’ Applied to app components •Maps key goals of app or service and correlates to clear technical standards for architecture, hardening of server/ service, app framework, containers •Applies Stage 1 & Stage 2 of PASTA Evidence Driven Threat Model •Integrate threat log data analysis •Focus on logs that support attack vector w/ greatest motives (e.g. – TLS MITM vs. Injection based events) •Correlate threat evidence for substantiating threat trends of attacks for target apps. Full Risk Based Threat Model •Ability to run statistical analysis/ probabilistic analysis on threat data & attack effectiveness •Consider non-traditional attack vectors, still supporting threat motives. •Conduct probabilistic analysis on threat data and attack sequences from pen testing efforts.
  8. Collaboration in DevSecOps Tony UcedaVelez // @t0nyuv Carnegie Mellon TMM

    November 2016 Study “Developed at DePaul University, the Persona non Grata approach makes threat modeling more tractable by asking users to focus on attackers, their motivations, and abilities. Once this step is completed, users are asked to brainstorm about targets and likely attack mechanisms that the attackers would deploy.” Source: https://insights.sei.cmu.edu/sei_blog/2016/11/cyber-threat-modeling-an-evaluation-of-three-methods.html • PnG reflected least false positives • PnG reflected consistent threats across multiple teams conducting threat analysis • PASTA focuses on: • Substantiating models with real threats • Supporting threats via real attack patterns that can be tested (DevSecOps test cases) • Supporting vulns that map to attack patterns (e.g. – CWE/ CVE: CAPEC mapping) • Collaborative amongst various constituents APPLICATION THREAT MODELING ACTIVITIES per STAGE MGT PMO BA ARC SWE QA SYS SOC RL PC SA EA CTO VA PT STAGE 1 - DEFINE BUSINESS OBJECTIVES - Est. New TM = 2-4 hours | Est. Repeat TM = < 1 hour A R R A I I I − I R I I R − − M GT Product M gmt Obtain business objectives for product or application A I R A I I I − I − − I I − − P M O Project M gmt Identify regulatory compliance obligations A I I A I I I − I R − I I − − B A Business Analyst Define a risk profile or business criticality level for the application A I I A I I I − I C I I R − − A R C Architect Identify the key business use cases for the application/product A R R A I I I − I − − I I − − SWE Software Engineer STAGE 2 - TECHNICAL SCOPE - Est. New TM = 3-4 hours | Est. Repeat TM = 1-3 hours I I C A R/A C I − I − I C I − − QA Quality Assurance Enumerate software applications/database in support of product/application I I C A R/A C I − − − − C I − − SYS SysAdmin Identify any client-side technologies (Flash, DHTML5, etc.) I I C A R/A C I − − − I C I − − SOC Security Operations Enumerate system platforms that support product/application I I C A R/A C I − − − I C I − − R L IT Risk Leader Identify all application/product actors I I C A R/A C I − − − I C I − − P C Product Compliance Enumerate services needed for application/product use & management I I C A R/A C I − − − I C I − − SA Software Assurance Enumerate 3rd party COTS needed for solution I I C A R/A C I − − − I C I − − EA Enterprise Architect Identify 3rd party infrastructures, cloud solutions, hosted networks, mobile devices I I C A R/A C I − I − I C I − − C T O Administration STAGE 3 - APPLICATION DECOMPOSITION - Est. New TM = 8 hours | Est. Repeat TM = 4 hours I I I A R C C − I − − C − − − VA Vuln Assessor Perform data flow diagram of application environment I I I A R I C − − − − C − − − P T Pen Tester Define application trust boundaries/trust models I I I A R C C − − − − C − − − Enumerate application actors I I I A R C C − − − − C − − − C o rpo rate F unctio ns Identify any stored procedures/batch processing I I I A R C C − − − − C − − − Office of the CTO Enumerate all application use cases (ex: login, account update, delete users, etc.) I I I A R C C − − − − C − − − Compliance STAGE 4 - THREAT ANALYSIS - Est. New TM = 6 hours | Est. Repeat TM = 2 hours I I R/A A R/A R/A C C − − − I − − − Security (ISRM ) Gather/correlate relevant threat intel from internal/external threat groups I I R/A A C I C C − − − I − − − Review recent log data around application environment for heightened security alerts − − I A R R/A I C − − − I − − − Gather audit reports around access control violations − I I A R C I C − − − I − − − R Responsible Identify probable threat motives, attack vectors & misuse cases I I I A R/A C I C − − − I − − − A Accountable STAGE 5 - VULNERABILITY ASSESSMENT - Est. New TM = 12 hours | Est. Repeat TM = 6 hours I I I A R C I C I − − C − R/A R C Consulted (2 way) Conduct targeted vulnerability scans based upon threat analysis − − − A R C I C I − − I − R R I Informed (1 way) Identify weak design patterns in architecture − − − A R C I − − − − C − R C Review/correlate existing vulnerability data I I I A R I I C − − − I − R/A I Map vulnerabilities to attack tree − I I A R I I − − − − C − C I STAGE 6 - ATTACK ENUMERATION - Est. New TM = 10 hours | Est. Repeat TM = 5 hours I I I A R R − − I − − C I I R/A Enumerate all inherent and targeted attacks for product/application I I I A R C − − I − − C I I R/A Map attack patterns to attack tree vulnerability branches (attack tree finalization) − − − A R C − − I − − C − I A Conduct targeted attacks to determine probability level of attack patterns − − − A C R − − I − − C − I R/A Reform threat analysis based upon exploitation results I I I A R C − − I − − C I I C STAGE 7 - RESIDUAL RISK ANALYSIS - Est. New & Repeat TM = 5 days (inc. countermeasure dev.) C I I A R C C C I I C C I I R Review application/product risk analysis based upon completed threat analysis I I I A R C I C I I C C I I R BU/Product Groups Corporate Functions R o les Legend R A C I Legend 3rd Party
  9. Learn to Substantiate Your Model Research • Threat Data •

    Threat Intelligence • Industry Reports/ Trends Analyze • Select most relevant threats • Consider timing of threat info • Remember that attack patterns ≠ threats Incorporate • Prioritized top threats based upon assumed impact • Threats serve as top nodes in attack tree • FUD perceptions do not constitute valid threat patterns • Threats help contextualize probability of threat occurrence for assets at risk • Provides realistic considerations to real threats affecting critical infrastructure (i.e. – Transportation/ Energy) • Threat patterns provide a top level hierarchy context to organize underlying attacks, vulnerabilities around crucial infrastructure being threat modeled. • Provides ‘living’ body of content around viable threats • Should be revisited monthly to see if an evolving threat landscape warrants changes to the threat library • Provides a list of threats that shape the pinnacle node of attack trees. • An exhaustive list is not the objective; a quality list is. Objectives in Building a Threat Library Tony UcedaVelez // @t0nyuv Role of the Threat Library
  10. Author name her • Vulnerability reports masquerading as threat information

    Security Media Can Have Worst Threat Info Tony UcedaVelez // @t0nyuv Break Bad Threat Consumption Habits Importance of Consistency in Good Threat Information • Reported incidents against CI best form of auto-checking or adding to threat libraries Industry Incidents to Threat Considerations • Collaboration between those that understand functional use + creative, threat driven approaches can easily kickstart a great threat library. • For Critical Instructure government resources provide good insight to the function of key industries and associated systems • [ENERGY] European Commission (EC), Energy Expert Cyber Security Platform (EECSP) Expert Group • [TRANSPORTATION] PT-ISAC (U.S) Public Transportation Info Sharing & Analysis Center • Transit And Rail Intelligence Awareness Daily (TRIAD) replaced daily PT-ISAC report Function + Dysfunction Threat Mashup
  11. Threat Modeling + DevOps in Energy Sector Opportunities for Security

    Automation via Evidence Supported Threat Modeling A brief case study on Cloud adoption in Oil & Gas and how an evidence supported library can be the cornerstone to a good threat model and foster security automation.
  12. • Traditional threats to Oil & Gas are physical in

    nature • piracy • terrorism • insurgency • organized crime • civil protest • inter-state hostilities • vandalism • internal sabotage • Highly competitive, capital intense industry, depending on accuracy field data shapes future use of Cloud adoption • Cyber related threats aim to incapacitate interconnected systems. • Taint Data [Integrity, Availability] Research Exploration, Operations Data • Extortion via suppressing [Availability] of Cloud management panels or Cloud Energy SaaS Apps • Mine Cryptocurrency on PaaS infrastructure [Integrity] • Steal Secrets (e.g. - Exploration/ R&D) [Confidentiality] Building a Threat Library for Oil & Gas Building a Threat Library for Gas & Oil Players DevSecOps Threat Tuning Begins w/ a Solid Threat Library
  13. Selecting a Cloud Target in Wellhead Operations Targeted OSINT Role

    Playing the Threat Actor Equinor (formerly Statoil) Example for Wellhead Operations Application FlexTrack Multi-Tenant Energy App Authentication Components Cloud WellSpot Application under PASTA’s Threat Analysis IV • Sabotage • Steal • Extortion Threat Library • Azure AD • Web API • Auth Panel Attack Surface • Auth Bypass • Social Eng • Injection Attack Patterns • Web Server • Web App • Human Vulnerable Assets
  14. Author name her Tony UcedaVelez // @t0nyuv Sample Threat Model

    w/ Custom Oil & Gas Threat Library Associated Threats Attack Surface Establish Persistence Steal Secrets Taint Data Sabotage Extortion Cryptojacking Tenant Hopping Cloud Admin Access Threat Library Threat Motives Long term, multi-faceted compromise Steal R&D Data, Wellhead locations, Well Performance Metrics Affect accuracy in reporting for more macro economic or competitive reasons Vengeance driven, corporate sabotage to largely disrupt availability of information, services Hold hostage parts or complete IT infrastructure for the purposes of using as financial leverage. Leverage compromised IT infrastructure in order to mine crypto currencies Discover other Energy providers leveraging WellSpot multi-tenant cloud application Obtain administrative access to control panel for aforementioned motives; sell access on black market. Employees/ Contractors Endpoints Web Apps/ APIs Internal Applications Domain Controllers Cloud Admin Panel/ API O365 Network Attack Patterns Vishing, Smishing, Rogue SW Drive-by-download, malware via docs, email Injection based attacks, authentication by-pass Insider threats, rogue software Pass the hash cracking attempts Social Eng, Illicit Cloud Access via Auth Attacks Targeted phishing over email vector Network MITM Equinor’s WellSpot Threat Model Summary Card
  15. Tony UcedaVelez // @t0nyuv Attack Tree Rooted by Sabotage Threat

    • Attack trees provide DevSecOps automation blueprint • Oil & Gas depends on depends on accurate field data quickly; Cloud provides automation opportunity • Cyber related threats aim to incapacitate interconnected systems. • Taint Data [Integrity, Availability] Research Exploration, Operations Data • Extortion via suppressing [Availability] of Cloud management panels or Cloud Energy SaaS Apps • Mine Cryptocurrency on PaaS infrastructure [Integrity] • Steal Secrets (e.g. - Exploration/ R&D) [Confidentiality] Cloud WellSpot Application under PASTA’s Threat Analysis IV [A] Impersonate sensors POST request [T] Sabotage Flaring Alarm Data [A] Physically Alter Sensor Endpoint [A] Alter historical alert logs [V] Insecure Cache [V] Unmonitored DB Access [V] Insecure DB Access [V] Exposed Redis Cache [V] Exposed MSSQL Admin Credz [C] Redis Cache Service [C] Local DB Account on MSSQL Azure Instance [C]Unencrypted SQL Connect strings in configs/ scripts [V] Insecure Sensor 802.11 [V] Allowance for rogue sensor parts [C] MS IIS WS [C] MS WCF [V] Insecure WCF accepts rogue service requests [V] No HTTP Validation Checks [V] Insecure Transport Layer [C] Data Monitoring Sensor [D] Defined monitoring SLAs for device uptime (D] FIDO enabled IOT Sensor (D] Non-pub Redis Architecture (D] Fully Patched Redis Instance (D] Implement Integrated Auth (D] Apply Audit Reads to Azure Worker Process [D] Divest stored local auth strings CAPEC-62: Cross Site Request Forgery (V3) CAPEC-105: HTTP Request Splitting (V1) CAPEC-196: Session Credential Falsification through Forging CVE-2009-3555 CWE-20: Improper Input Validation CVE-2013-1337 (D] Enable WAF at Cloud management layer (D] Apply patch to update WCF version (D] Enable TLS 1.3 for all web service connections (D] Introduce sanitization whitelisting checks as code module CVE-2016-10672 CVE-2016-7254 CVE-2014-2361* CWE-538: File and Directory Information Exposure CWE-209: Information Exposure Through an Error Message CWE-778: Insufficient Logging None Available
  16. Author name her Tony UcedaVelez // @t0nyuv Script Mapping Countermeasures

    to Threat Targets Detective Control Checks to Automate for Exposed Redis Mapping a Detective Control to a Threat Target • Detective control can be implemented during the DevSecOps environment Build process or Deploy, Operate, & Maintain cycles • Check validates FW rules in front of Redis Cache service for Cloud Energy application. • Again, target asset or component is supported by threat model, thereby rationalizing its prioritization as a control check
  17. Author name her Tony UcedaVelez // @t0nyuv Script Mapping Countermeasures

    to Threat Targets Detective Control Checks to Automate for Exposed Redis (continued) Result Tracking on API Responses • Detective checks help to establish a baseline of security configuration under Monitor & Operate DevSecOps phases. • Detective Open Source tools like: • Scout2 (https://github.com/nccgroup/S cout2), • Prowler https://github.com/toniblyx/pro wler) • Cloud Security Suite https://github.com/SecurityFTW /cs-suite
  18. Author name her Tony UcedaVelez // @t0nyuv Script Mapping Countermeasures

    to Threat Targets Preventative Control Checks to Automate for Exposed Redis Result Tracking on API Responses • Detective checks help to establish a baseline of security configuration under Monitor & Operate DevSecOps phases. • Altering or creating a new rule is also easy by simply changing http method • PUT https://management.azure.com /subscriptions/{subscription Id}/resourceGroups/{resource GroupName}/providers/Microso ft.Cache/Redis/{cacheName}/f irewallRules/{ruleName}?api- version=2016-04-01 • Creating new rule can be done as part of Build or Deploy phases.
  19. Author name her Tony UcedaVelez // @t0nyuv AWS Automation Opportunities

    JSON Supported Web Interfaces Facilitates Security Checks • Detective controls against CloudTrail web API allows for detective audit checks. • Image on far left identifies if subnetting is present within a VPC for an AWS account. Useful for determining if subnetting perhaps needs to be present with logical ACLs applied.
  20. Author name her 1. Azure provides centralized security information via

    Hybrid compared to 7 different AWS security product subscriptions 2. 4SubSea management of WellSpot in Azure, following a traditional approach will be largely vuln, event driven 1. Blind to a threat library or model 2. Not fueling threat data back into a threat model 3. Traditional approach would still be overwhelming to automate – where do you start? 3. Cloud security dashboards today are simply carrying traditional SOC data 1. Although Azure does great job of aggregating: 1. WAF Alerts 2. Policy violations 3. VM vulnerabilities via partner scans or Azure agents (configuration checks) 2. Threat context is still missing 4. For Energy sector, is your SaaS provider doing either – traditional security driven or evidence, threat model supported SaaS management? 5. Threat inspired management of Cloud events is more focused & iterative. Focused vs. Traditional Tony UcedaVelez // @t0nyuv Azure Security Manager (Hybrid) Comparing & Integrating CloudSec Ops to TM Led DevSecOps
  21. The Future of Your Threat Lib & Security Automation Industry

    Perspective + Adversarial Tendencies “Understanding a range of threat scenarios provides the basis for security readiness and opportunity for security automation.”
  22. Business + Hacker + Technologist = Good Threat Lib Global

    Economic / Business Business perspective keeps understanding in terms of what are ultimately business threats, not necessarily security threats. Hacker or criminal mindset is helpful in emulating the psych needed to circumvent barriers for the purposes of achieving threat objectives to a criminal or criminal group. Attack patterns, vulns, and countermeasures will largely be technical. Knowing how they work and how to automate places an important role. Mindset to Build Future Threat Libs Tony UcedaVelez // @t0nyuv Hacker Sound Technologists
  23. Author name her 1. PT-ISAC :: Transportation (U.S) C- •

    TRIAD is the Transit & Rail Intelligence Awareness Daily replaces daily PT-ISAC reports. Email based. • ISACs in general reflect prior incident information with limited IOC data. (except: FS-ISAC) 2. European Commission on Energy Sector A+ 1. CybSec in Energy Sector https://ec.europa.eu/energy/sites/ener/files/documents/eecsp_report_final.pdf 2. DOE (U.S) Assessment of Electricity Disruption Incident Response Capabilities https://www.energy.gov/sites/prod/files/2018/05/f51/EO13800%20electricity%2 0subsector%20report.pdf B+ 3. Twitter, Google News Alerts A- 4. Industry Leaders (GE), Data Command, & OEM leaders and their sector reports on data reliance for operations A+ Threat Libraries Are Simple, Useful, Informative Tony UcedaVelez // @t0nyuv Resources & References Grading Online Threat Information Sources
  24. Author name her 1. “Cloud” encompass management PaaS/ IaaS layer

    that has exposed APIs and web UI interface 2. “Cloud” also encompasses the full tech stack within your SaaS. Agent or traditional agentless scans from within the Cloud remain. 3. Left Sided Security opportunities begin w/ a Threat inspired Threat Model → helps define security objectives in PLAN, CODE, & BUILD efforts 4. External threat intelligence feeds are noisy. TAXII services still need to evolve and follow a schema that can easily map CAPEC, CVEs, CWEs 5. Threat to Countermeasure to Threat Re-Learning automation will come from the private sector. 1. Lessons from SCAP shortcomings in mass adoption 2. STIX, TAXII MITRE divestiture; OASIS schema changes 6. Web supported interfaces facilitate greater automation via workflows Standardization, Correlation key to Automation in Cloud Tony UcedaVelez // @t0nyuv Closing Remarks & Future Outlook Threat Libs Contextualizing Security Info & Automation Source: metalop.com
  25. Author name her • @t0nyuv • www.linkedin.com/tonyuv • [email protected]

    https://versprite.com/security-resources/blog/ Questions? Tony UcedaVelez // @t0nyuv Thank You