Attacks/Breaches

4/13/2015
11:00 AM
Steve Riley
Steve Riley
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
100%
0%

Better Together: Network Operations & Infosec

Getting networking and information security teams together in the same room is a critical step for companies that want to build a continuous information security culture.

The recent computer attacks against Anthem and Premera Blue Cross are the latest case studies that demonstrate the necessary convergence of IT and security operations. This is something information security professionals should welcome, even demand. In fact, the network operations team can be an information security department’s best resource for gaining understanding and insight into an organization’s security operations, which traditional security solutions and best practices alone cannot provide.

Understanding what “normal” network activity looks like is critical to quickly spotting suspicious activities that point to a malicious outsider or insider, or a mistake by an innocent employee that result in data theft or loss. However, bridging the gap between the Network Operations Center (NOC) and Security Operations Center (SOC) is not only a technology challenge, but also an organizational one. There are three keys to fostering this collaboration:

  • Eliminating the silos that separate both systems and personnel, 
  • Creating joint emergency response teams comprised of network operations and information security personnel, and
  • Implementing a long-term plan for how to constantly improve processes and training.

In the typical IT organizational chart, network operations is responsible for ensuring system performance and information availability, while information security focuses on protecting those systems and information stores from threats. Typically, as Rudyard Kipling wrote, “and never the twain shall meet.” However, the spate of high-profile breaches against large companies across retail, financial services, and healthcare over the last year show that must change.

In most of these cases, the companies were not aware they had been breached until a third party notified them. Although Anthem discovered its breach on its own after a database administrator noticed a query running with his account that he didn't initiate, that discovery wasn’t made until after the attacker had spent six weeks silently stealing information.

For an enterprise, the key takeaway is its critical need to be able to detect activities on the network that can lead to a data breach. That capability is diminished by the fact that security operations and network operations typically work in silos. That means security vulnerabilities have to be handled twice: first by the SOC, which has evidence of malicious activity but often no mechanism for actively stopping it, and then again by the NOC, which needs to wait for specific instructions from the SOC. Any time delay here creates advantages for an attacker.

Additionally, most technology systems and business applications work in their own silos and do not communicate with one another. Consequently, IT cannot streamline and automate information sharing or event correlation between security vulnerabilities and performance issues. Here are four steps to overcome this organizational hurdle:

Step 1: To maximize insight, foster teamwork
The first step is to acknowledge the value of the network team in security operations. Network engineers have visibility and access to forensic data that simply doesn’t exist in other parts of an organization. Once IT leadership acknowledges this, the next step is all about putting the tools and processes in place to integrate network resources into security processes. It sounds simple, but having a thorough understanding of normal is a critical factor in preventing potentially harmful activity on your organization’s network.

Step 2: Packet capture meet SIEM
Security teams should work to leverage the network team’s investments in packet capture agents, packet analyzers, NetFlow sources and deep packet inspection performance monitoring. Often these can be tightly integrated into a Security Incident Event Management (SIEM) system for high-fidelity visibility, and quick pivots into useful forensic data. It’s also worth noting how the Premera breach serves a reminder to information security professionals that joining forces with the network team does not obviate the need to continue traditional due diligence. Premera had failed to install the most recent security patches, opening the door to the attackers.

Step 3: Change the culture but hands off also applies
In terms of fostering collaboration, there should be clear roles and responsibilities across NOC and SOC teams, supported by well-defined “hand-offs.” Documenting them isn’t enough. You have to use them, analyze key weaknesses, and continuously improve them. Joint emergency response teams enable broader insight, increased tribal knowledge, faster artifact gathering, well-rounded analysis, and ultimately a stronger information security posture. Identify and appoint a strong leader who can rally the troops, and mold them into a cohesive team passionate about continuous improvement – not just compliance.

Step 4: Don’t accept the status quo
With a strong base to build upon, an organization should turn its focus to accelerating and improving its capabilities. Never be satisfied with the status quo. To optimize operations, leverage techniques from traditional continuous improvement strategies such as Theory of ConstraintsLean, or lessons learned from the DevOps movement.  Invest in training and skill development so your people are effective and empowered, break work down into smaller chunks so it flows smoother, automate to gain operational efficiencies, and measure risk, performance and quality of operations.

Threats are getting increasingly harder to discover, and attackers are more brazen than ever. Getting network operations and information security teams together in the same room for the first time will be a critical step for organizations that want to build a continuous information security improvement culture capable of defending against those threats.

Steve actively works to raise awareness of the technical and business benefits of Riverbed's performance optimization solutions, particularly as they relate to accelerating the enterprise adoption of cloud computing. His specialties include information security, compliance, ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20161
PUBLISHED: 2018-12-15
A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and earlier allows attackers to disable cameras via Wi-Fi, because incident clips (triggered by the motion sensor) are not saved if the attacker's traffic (such as Dot11Deauth) successfully disconnects the Sync Module from the...
CVE-2018-20159
PUBLISHED: 2018-12-15
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a "...
CVE-2018-20157
PUBLISHED: 2018-12-15
The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files.
CVE-2018-20154
PUBLISHED: 2018-12-14
The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated users to discover all subscriber e-mail addresses.
CVE-2018-20155
PUBLISHED: 2018-12-14
The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated subscriber users to bypass intended access restrictions on changes to plugin settings.