InfoSecChat

Fox In The Hen House? (2 of 3)
Could you spot the fox in your hen house? Protect your sensitive data from insider threats.
   8 years ago
#InfoSecChatFox In The Hen House? (1 of 3)Could you spot the fox in your hen house? Protect your sensitive data from insider threats.
   8 years ago
#InfoSecChatFox In The Hen House? (3 of 3)Could you spot the fox in your hen house? Protect your sensitive data from insider threats.
IBM Security
Q4: How can a Data Activity Monitoring (DAM) solution help me protect against insider threats?
Christina F Thompson
A4: Automated, real-time controls implemented thru a well-designed DAM solution can prevent unauthorized actions
Cindy Compert,CIPT/M
a4 The best offense is a good defense.. Go where the money is
Andy Land
A4: One of the core tenets of stopping #insiderthreats is watching the data. Know where the honeypots are and watch them. Know what users should be doing in those honeypots.@IBMSecurity
AdrianLane
A4: DAM detects unusual queries and can block. Think SQL Injection
Luis Casco-Arias
Since the ultimate asset is data, it makes sense to monitor who is accessing that data in real time, and what they are doing to it
Cindy Compert,CIPT/M
Dont forget File Activity Monitoring !!
AdrianLane
A4: And DAM detects behavioral changed – if user does something unusual
Luis Casco-Arias
Since DAM can control access to the data, it can even prevent a breach by getting threat info from the network
Leslie Wiggins
A4: With the right solution, you can monitoring sensitive data and files and then tighten control around access
Cindy Compert,CIPT/M
and correlate activity with network applications and identity and access management #SIEM
AdrianLane
A4: Some cases redaction - if u don't trust user, blank out results
Andy Land
@AdrianLane It really is that user with what data they are touching combo. If you know what users should be doing with your data and then monitor that, then you have more than a fighting chance.
AdrianLane
@andylandtx Yes - when do you not trust the user? It's beyond Authorization
Andy Land
@AdrianLane Agreed. Why show users more data than they need to see. Mask it, redact, to keep data private and secure.
Cindy Compert,CIPT/M
I'm amazed how many #InfoSec pros are not aware of #DAM Data Activity Monitoring
Leslie Wiggins
@CCBigData or of File Activity Monitoring, I'm sure
AdrianLane
@CCBigData Too busy managing their WAF
Andy Land
@cascoarias Data is what they want. So monitor it and who is accessing it.
IBM Security
Q3: What are best practices around looking for insider threats?
AdrianLane
A3: Monitoring. It’s the only way to detect database misuse. But specifically …
AdrianLane
@IBMSec A3: looking behaviorally at what a user selects and quantity of data
Luis Casco-Arias
First, you need to understand what you want to protect. The risk-value assessment
Andy Land
A3: Classify sensitive data. Monitor privileged user activity. Put in place user behavioral analytics. Take a programmatic approach. Hang in there!@IBMSecurity
Leslie Wiggins
A3: Monitoring, paired with blocking and alerting, to protect sensitive data
AdrianLane
A3: really hard to differentiate between normal and abnormal use
Leslie Wiggins
@AdrianLane I think that's why machine learning is so important to apply to the issue
Luis Casco-Arias
A risk-value assessment gives you a view of what resources/data is critical, but also who should be accessing
Andy Land
@AdrianLane Agreed that we have to be able to separate normal user activity from anomalous activity.
AdrianLane
@LeslieW66749952 Machine learning is one way - semantic - meta data
Luis Casco-Arias
Once you identify the current risk-value status, you can minimize that risk by cleaning up data, or entitlements, or change the access policies.
Cindy Compert,CIPT/M
@AdrianLane Yes- machine learning is the only viable method for #BigData
Christina F Thompson
A3 Another best practice is to use encryption to render sensitive data unreadable, so an attacker cannot
gain unauthorized access to data from outside.
Andy Land
@cascoarias Risk-value is the only way to do this within a budget.
Luis Casco-Arias
You also need to verify that the insider risk is kept to a minumum as insides access the data on a regular basis.
Andy Land
@AdrianLane We do love the Racer X image. But where is Chim Chim?
Luis Casco-Arias
and finally you need to mitigate risk dynamically by restricting access and integrating with IAM or Security configuration tools to mitigate access configurations.
AdrianLane
@andylandtx - you know damn well he's in the trunk of the Mach 5
IBM Security
Q1: Who is an insider?
AdrianLane
A1: An employee with valid credentials #infosecchat
Andy Land
A1: Anyone (employees, partners) that have access to sensitive data. So knowing what is sensitive to you is critical.@IBMSecurity
Leslie Wiggins
A1: Also a 3rd party or partner that has access
Victoria_A
Can it be a vendor or 3rd party rep/
Christina F Thompson
yes @AdrianLane and familiar with the organization's data & intellectual property as well as the methods that are in place to protect them
Cindy Compert,CIPT/M
a1 anyone who has 1. Elevated privacy and 2. Access to valuable info
Victoria_A
Thanks leslie!
Leslie Wiggins
@_Vicki_A_ Great minds think alike!
AdrianLane
A1: Is an attacker with employee credentials an insider? #infosecchat
Luis Casco-Arias
people or machines that have access to company resources
Cindy Compert,CIPT/M
anyone who has access to valuable assets, whether an employee or contractor
Leslie Wiggins
@AdrianLane Good question. It's certainly a wolf in sheep's clothing. To the organization, it sure looks like the insider!
Luis Casco-Arias
basically someone or something that has credentials
Andy Land
A1: The key is does the user have the entitlements to sensitive data. So, are you monitoring the users and data looking for anomalies. @IBMSecurity
Andy Land
@AdrianLane I say yes. I think part of Insider Threat is outsiders getting insider credentials.
Leslie Wiggins
@AdrianLane Adrian - what is the most common type of insider threat you end up discussing with folks?
Luis Casco-Arias
right @andylandtx the important part is what type of credential access....
AdrianLane
Pissed off employees #infosecchat
Luis Casco-Arias
some could be a misconfiguration like a "guest" account with lots of access to sensitive data
Cindy Compert,CIPT/M
@AdrianLane laid off ex-employees who still have credentials
Andy Land
@AdrianLane I think I would be monitoring tightly at review times in your company. :)