Critical Security Controls
Why Choose JED Consulting Services LLC?
Our Unrivaled Passion for Cyber Security and Being the Best Means Superior Solutions that Work You. My job is to help you achieve success. We will deliver a path forward by balancing realities and maturity.
John Donnelly and Sons has a rich history and successful history based on trust. Beginning in late 1800s our ancestors have served as trusted business partners to countless clients of varying sizes across a number of industries.
Our founders started with a vision of being good community partner and the money and profits will come after we recognize that we are all in this together. We have evolved and grown with the country, all while carrying a proud heritage of business excellence. Today, JED is well known and respected for our innovative and for putting our employers first. We are still committed to three essential values.
1) Leading with perspective as your partner- we move the industry forward with our unique insights, points of view, ideas and solutions, leading our employers,clients, and each other to think beyond the ordinary.
2) Working in the trenches as your resource to understand your needs as team member and acting in the principle that your success is ours. We dig into your problems and evaluate the bigger picture , then unite the optimal people , technology and know how to execute the most effective solutions.
3) We are relentlessly focused on enabling your success, freeing your organization and your people to move swiftly on the path to progress.
JED's only job is to help you achieve success like his ancestors have continued done for over 150 years. Through wars and peace John Donnelly has stepped up to provide solutions to major issues facing not only individual organizations but our community.
JED is a skilled expert committed to performing research, developing solutions to solve specific problems as well as those of the industry at large. Togethter with a very well respected groups of subject matter experts and thought leader the represent every category of cyber security.
JED has been constantly pushing the envelope and synthesizing new information. We have been looking systems and understanding the functions of each individual components to identify new vulnerabilities and pioneering mitigations.
JED has researched the levels of protection provided by specific technologies, and gained in-depth understanding of their features and functionaility.
JED has worked on-site at employers, applying and continuously evolving our knowledge in unique real-world scenarios.
By combining JED's know how and expertise with the technology and support of our premier partners we are able to transcend our reach beyond traditional corporate boundaries. As a result we are able to provide you with better more effective, more integrated solutions that meet the unique requirements of your specific environment.
• The HIPAA Security Rule provides the "what" in regard to requirements with which health care organizations must comply, yet we're often asked "how can we implement safeguards that fulfill the intent of the rule?" and "what else should HCO's be doing to protect patient and hospital assets?". This company is purposefully built to provide an effective answer. • Our Health Care Security Group dissects the Security Rule and highlights important security controls to identify and mitigate both the insider and external based attacks.
If you are an information security professional working in health care, our company will provide you with practical advice for stopping even the most advanced attacks that may target the organization.
Our initial focus was on existing threats to health care information systems and data. We will examine 'why' and 'how' patient information is being targeted, as well as evolving trends, including, but not limited to the commercialization of malicious software, medical identity theft, and insider threats. JED also provides clients with an overview of the HIPAA Security Rule and its context, with close attention paid to the rules structure, safeguards, and the implementation specifications governing ePHI. This information will remove ambiguity and get of how to defend patient data and other sensitive information. The section concludes with a discussion on security frameworks, controls, and practical countermeasures.
Who in your organization has done an analysis of recent breach data? Who has focused on sensitive asset identification and hardening? Do we have a foundation for a data loss prevention ("DLP") program?
JED Consulting Services begins with examining the risk analysis requirement of the Security Rule, §164.308(a)(1)(ii)(A) along with relevant audit findings and important considerations for developing a defensible risk management process. Physical and technical safeguards are also examined. Have we then transition to a review of electronic health records ("EHR") security, often a prized target by criminals, and EHR application assessment and hardening? JED Health Care Security group concludes by discussing the current state of medical device security and risk management processes.
What can we do to Implement and audit the critical controls we have focused on since 1989? • Apply a security framework based on actual threats that is measurable, scalable, and reliable in stopping known attacks and protecting organizations' important information and systems • Understand the importance of each control, how it is compromised if ignored, and explain the defensive goals that result in quick wins and increased visibility of network and systems • Identify and utilize tools that implement controls through automation • Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control • Employ specific metrics to establish a baseline and measure the effectiveness of security controls • Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more • Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process
We will cover an introduction and overview of the Critical Security Controls, laying the foundation for the rest of the engagement. For each control the following information will be covered, and we will follow the same outline for each control: 1. Overview of the Control 2. How it is Compromised 3. Defensive Goals 4. Quick Wins 5. Visibility & Attribution 6. Configuration & Hygiene 7. Advanced 8. Overview of Evaluating the Control 9. Core Evaluation Test(s) 10. Testing/Reporting Metrics 11. Steps for Root Cause Analysis of Failures 12. Audit/Evaluation Methodologies 13. Evaluation Tools 14. Exercise to Illustrate Implementation Or Steps for Auditing a Control
• Critical Control 1: Inventory of Authorized and Unauthorized Devices o Any time a new device is installed on a network, the risks of exposing the network to unknown vulnerabilities or hampering its operation are present. o Malicious code can take advantage of new hardware that is not configured and patched with appropriate security updates at the time of installation. o Attackers can use these vulnerable systems to install backdoors before they are hardened. In automating critical control 1, it is critical for all devices to have an accurate and up-to-date inventory control system in place. o Any device not in the database should be prohibited from connecting to the network. o Some organizations maintain asset inventories by using specific large-scale enterprise commercial products or by using free solutions to track and sweep the network periodically. o To evaluate the implementation of Control 1 on a periodic basis, the evaluation team will connect hardened test systems to at least 10 locations on the network. o This will include a selection of subnets associated with DMZs, workstations, and servers.
• Critical Control 2: Inventory of Authorized and Unauthorized Software o An organization without the ability to inventory and control its computers' installed programs makes its systems more vulnerable to attack. o Furthermore, poorly controlled machines are more likely to be running software that is unneeded for business purposes, introducing potential security flaws. o Compromised systems become a staging point for attackers to collect sensitive information. o In order to combat this potential threat, an organization should scan a network and identify known or responding applications. o Commercial software and asset inventory tools are widely available. o The best tools provide an inventory check of hundreds of common applications, pulling information about the patch level of each installed program. o This ensures that it is the latest version and that it leverages standardized application names, like those found in the Common Platform Enumeration (CPE) specification. o In addition to inventory checks, tools that implement whitelists (allow) and blacklists (deny) of programs are included in many modern end-point security suites. o To evaluate the implementation of Control 2 on a periodic basis, the team must move a benign software test program that is not included in the authorized software list on 10 systems on the network. o The team must then verify that the software is blocked and unable to run.
• Critical Control 3: Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers o Default configurations of software are often geared to ease-of-deployment and ease-of-use and not security, leaving some systems exploitable in their default state. o Attackers attempt to exploit both network-accessible services and client software using various forms of malware. o Without the ability to inventory and control installed and running, enterprises make their systems more vulnerable. o Organizations can implement this control by developing a series of images and secure storage servers for hosting these standard images. o Configuration management tools can be employed to measure the settings of the installed software and to look for deviations from the standard image configurations used by the organization. o To evaluate the implementation of Control 3 on a periodic basis, an evaluation team must move a benign test system (one that does not contain the official hardened image, but does contain additional services, ports, and configuration files changes) onto the network. o The evaluation team must then verify that the systems generate an alert or e-mail notice regarding the changes to the software.
• Critical Control 4: Continuous Vulnerability Assessment and Remediation o Soon after new vulnerabilities are discovered and reported by security researchers or vendors, attackers engineer exploit code and launch it against targets of interest. o Any significant delays finding or fixing software with critical vulnerabilities provides ample opportunity for persistent attackers to break through and gain control of vulnerable machines. o A large number of vulnerability scanning tools are available to evaluate the security configuration of systems. o The most effective vulnerability scanning tools compare the results of the current scan with previous scans to determine how the vulnerabilities in the environment have changed over time. o All machines identified by the asset inventory system must be scanned for vulnerabilities. o To evaluate the implementation of Control 4 on a periodic basis, the evaluation team must verify that scanning tools have successfully completed their weekly or daily scans.
• Critical Control 5: Controlled Use of Administrative Privileges o The most common method attackers use to infiltrate a target enterprise is through an employee's own misuse of administrator privileges. o An attacker can easily convince a workstation user to open a malicious e-mail attachment, download and open a file from a malicious site, or surf to a site that automatically downloads malicious content. o If the user is logged in as an administrator, the attacker has full access to the system. o Built-in operating system features can extract lists of accounts with super-user privileges, both locally on individual systems and on overall domain controllers. o These accounts should be monitored and tracked very closely. o To evaluate the implementation of Control 5 on a periodic basis, an evaluation team must verify that the organization's password policy is enforced and administrator accounts are carefully controlled. o The evaluation team does this by creating a temporary, disabled, limited privilege test account on ten different systems. o It then attempts to change the password on the account to a value that does not meet the organization's password policy.
• Critical Control 6: Maintenance, Monitoring, and Analysis of Audit Logs o At times, audit logs provide the only evidence of a successful attack. o Many organizations keep audit records for compliance purposes but rarely review them. o When audit logs are not reviewed, organizations do not know their systems have been compromised. Attackers rely on this. o Most free and commercial operating systems, network services, and firewall technologies offer logging capabilities. o Such logging should be activated, and logs should be sent to centralized logging servers. o The system must be capable of logging all events across the network. o The logging must be validated across both network and host-based systems. o To evaluate the implementation of Control 6 on a periodic basis, an evaluation team must review the security logs of various network devices, servers, and hosts.
• Critical Control 7: Email and Web Browser Protections o Web browsers and email clients are very common points of entry and attack because of their high technical complexity and flexibility, and their direct interaction with users and within the other systems and websites. o Content can be crafted to entice of spoof users into taking actions that greatly increase risk and allow introduction of malicious code, loss of valuable data, and other attacks. o Organizations must minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email systems.
• Critical Control 8: Malware Defenses o Malicious software is an integral and dangerous aspect of Internet threats. o It targets end users and organizations via Web browsing, e-mail attachments, mobile devices, and other vectors. o Malicious code may tamper with a system's contents, capture sensitive data, and spread to other systems. o To ensure anti-virus signatures are up-to-date, effective organizations use automation. o They use the built-in administrative features of enterprise endpoint security suites to verify that anti-virus, anti-spyware, and host-based Intrusion Detection Systems (IDS) features are active on every managed system. o They also run automated assessments daily and review the results to find and mitigate systems that have deactivated such protections or do not have the latest malware definitions. o The system must identify any malicious software that is either installed, attempted to be installed, executed, or attempted to be executed, on a computer system. o To evaluate the implementation of Control 8 on a periodic basis, the evaluation team must move a benign software test program appearing to be malware onto a system and make sure it is properly discovered and remediated.
• Critical Control 9: Limitation and Control of Network Ports, Protocols, and Services o Attackers search for remotely accessible network services that are vulnerable to exploitation. o Many software packages automatically install services and turn them on as part of the installation of the main software package. o When this occurs, the software rarely informs a user that the services have been enabled. o Port scanning tools are used to determine which services are listening on the network for a range of target systems. o In addition to determining which ports are open, effective port scanners can be configured to identify the version of the protocol and service listening on each discovered open port. o The system must be capable of identifying any new unauthorized listening network ports that are connected to the network. o To evaluate the implementation of Control 9 on a periodic basis, the evaluation team must install hardened test services with network listeners on ten locations on the network, including a selection of subnets associated with DMZs, workstations, and servers.
• Critical Control 10: Data Recovery Capability (validated manually) o When attackers compromise machines, they often make significant changes to configurations and software. o Sometimes attackers also make subtle alterations of data stored on compromised machines, potentially jeopardizing organizational effectiveness with polluted information. o Once per quarter, a testing team should evaluate a random sample of system backups by attempting to restore them on a test bed environment. o The restored systems should be verified to ensure that the operating system, application, and datum from the backup are all intact and functional.
• Critical Control 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches o Attackers penetrate defenses by searching for electronic holes in firewalls, routers, and switches. o Once these network devices have been exploited, attackers can gain access to target networks, redirect traffic on that network (to a malicious system masquerading as a trusted system), and intercept and alter information while in transmission. o Organizations can use commercial tools that will evaluate the rule set of network filtering devices, which determine whether they are consistent or in conflict and provide an automated check of network filters. o Additionally, these commercial tools search for errors in rule sets. Such tools should be run each time significant changes are made to firewall rule sets, router ACLs, or other filtering technologies. o To evaluate the implementation of Control 11 on a periodic basis, an evaluation team must make a change to each type of network device plugged into the network. o At a minimum, routers, switches, and firewalls need to be tested. If they exist, IPS, IDS, and other network devices must be included.
• Critical Control 12: Boundary Defense o By attacking Internet-facing systems, attackers can create a relay point to break into other networks or internal systems. o Automated tools can be used to exploit vulnerable entry points into a network. o To control the flow of traffic through network borders and to look for attacks and evidence of compromised machines, boundary defenses should be multi-layered o These boundaries should consist of firewalls, proxies, DMZ perimeter networks, and network-based intrusion prevention systems and intrusion detection systems. o Organizations should regularly test these sensors by launching vulnerability-scanning tools. o These tools verify that the scanner traffic triggers an appropriate alert. o The captured packets of the Intrusion Detection Systems (IDS) sensors should be reviewed using an automated script each day, which ensures log volumes are within expected parameters, are formatted properly, and have not been corrupted. o To evaluate the implementation of Control 12 on a periodic basis, an evaluation team must test boundary devices. o This is done by sending packet