Sie sind auf Seite 1von 3

tema meseca VAROVANJE KONČNIH TOČK (ENDPOINT SECURITY)

Saša Aksentijević spent his entire educational


and professional life in ICT area. First he
worked several years as an independent ICT
consultant, an owner of a start-up company
and a specialist for mass storage
technologies.
During the past seven years he has been
working in one the world’s biggest
multinational companies in the oil and gas
sector which performs off shore and
onshore turnkey projects. Holds B.Sc title
in business informatics, Master title in
ICT Management and ICT Security and
ISO 27001:2005 Lead Auditor
certificate. On top of that, he works as
business strategy consultant
specialized in safety at work and
human resource management and
he is certified ICT forensics court
expert at Commercial and
Municipal Courts. Recently, he
started his ph.d. studies in
Business economy.

WHAT TO DO IN CASE OF SECURITY BREACH AND


HOW TO PREVENT THEM?
SAŠA AKSENTIJEVIĆ 1. Approach the issue calmly and without phone calls. In most cases, the damage is
panic and avoid any form of written and already done when the information about
electronic communication including the security breach or incident has be-
come apparent. Even though quick re-

T
sponse is of high importance, it is even
here are several typical cases when cor- 5 more important to approach the issue
porate clients ask for services of foren- calmly and in analytical manner avoid-
sic analysis of computer systems and 4 ing an „emotional“ response. If there is a
analysis of front-end perimeter breaches, reasonable doubt that there has been
the most common ones being litigations 3 damage incurred to the company’s re-
and proceedings towards current or ex-em- sources, computer and network systems,
ployees. In this article I will try to give some company’s image and reputation, or the
2
advice to those responsible for responding computer systems and information have
to security breaches and what to do in order been used in a way that is contrary to the
to resolve the situation. It is important to business policy and strategy or that the
underline what to do, and even more im- 1 local laws have been violated, it is impor-
portantly, what NOT TO DO when re- tant to discuss the hard facts in complete
sponsding to security incidents. In most confidentiality with the highest decision
cases, doing nothing is better than doing levels within organization while mini-
just anything, so I will start with a list of ac- 1 – Avoid emotional response mizing the number of involved people.
tions not to be done, and that are usually 2 – Do not confront suspects and avoid
evidence contamination
The reasoning is simple: security and in-
prevalent in most organizations that do not 3 – Do not avoid authorities formation breaches are often initiated by
have well established incident response pro- 4 – Ensure consistent state of hardware people who are either highly positioned
cedures, or when they are entrusted ran- 5 – Do not conduct internal investigation with- within organizations or have direct
domly, either by hierarchy or by placement out professionals hands-on knowledge of the information
of the incident within organization, thus Fig 1: five petals of ICT forensic investigation system maintenance, therefore widening
“avoiding hot potato in their own lap“. “don’ts” the number of people involved in inci-
< VI/MAREC 2010 > 11
dent response might easily backfire and Create reponse plan Widen the scope
ately identified have been misused, for
render such attempts unsuccessful. At example, common terminals or worksta-
this stage it is important to avoid doubts Create list of hardware Secure the equipment tions, computers of coworkers from the
in those who are subject of the investiga- resources to be analyzed and service from changes office or company, mobile phones, palm-
tion, as it could result in further compro- top computer, electronic organizers?
Create list of services Segregate identified
mising the integrity of the information to be analyzed hardware Then the list should be updated while
systems or data deletion. evaluating not only affected hardware
2. A common error made by most manag- Prepare for it, but do not Change access
execute data restore credentials
but also the informational infrastructure
ers is immediately confronting the sus- of the organization. Which services and
pects personally after suspicion of a se- Identify and secure logs Ensure chain of evidence databases are maybe compromised and
curity breach, even before the forensic where are they located, are they internal
investigator has securely analyzed the Fig 2: Two pillars of ICT forensic investigation or external (distributed)?
available data, ensured the chain of evi- “do’s” 4. In the case that part of the security breach
dence and secured the evidence data is also data loss due to corruption and
avoiding contamination. This step is very do in case there is a suspicion that organiza- deletion, tapes and other media contain-
important because at this stage, evidence tion’s computer and network systems were ing last functional backup should not be
is secured for possible future proceed- abused, or that there is external security pe- immediately restored. Instead, forensic
ings in court processes rimeter breach. The same applies for possi- investigator should first look for evi-
3. Contact with the police should not be ble misuse of computers, notebooks, palm- dence, and only after evidence has been
avoided. This is true for information se- tops, external memories and ports, mobile secured, the service should be restored.
curity breaches. Being honest and telephones and other computer and tele- 5. All access and activity logs stored on
straightforward towards public and communication equipment. Let us outline computers, network equipment, server
stakeholders is a staple in successful cri- what should be done in order to ensure ad- systems, telephone exchange systems and
sis and PR management. If the law has equate response and analysis to forensic in- fax systems should be identified and se-
been violated in any way, after consensus vestigators and court experts once they are cured. They can be of great interest to the
with responsible within organization, involved in the process. breach investigation and help forensic in-
police and other authorities have to be vestigators to reach certain conclusions.
involved.
“IT IS IMPORTANT TO UNDERLINE
4. Never turn off computers and computer
systems that could be compromised. This WHAT TO DO, AND EVEN MORE “IF THERE IS A REASONABLE DOUBT
is also one of the most common mistakes IMPORTANTLY, WHAT NOT TO DO THAT THERE HAS BEEN DAMAGE
– managers usually want to turn off com- WHEN RESPONSDING TO SECURITY INCURRED TO THE COMPANY’S
puters in order to preserve evidence, INCIDENTS. IN MOST CASES, DOING RESOURCES, COMPUTER AND
however, sometimes it can be deleted by NOTHING IS BETTER THAN DOING NETWORK SYSTEMS, COMPANY’S
powering down systems. On the contra-
JUST ANYTHING.” IMAGE AND REPUTATION, OR THE
ry, if possible, try to ensure uninterrupt-
ed power supply until the forensic inves- COMPUTER SYSTEMS AND
1. In most cases, there should be a fine bal- INFORMATION HAVE BEEN USED IN
tigators arrive, but do not use those sys-
ance between sense of urgency and pre-
tems, to ensure that no changes are made A WAY THAT IS CONTRARY TO THE
serving the evidence. Computer systems
to data and file systems.
usually preserve evidence on them for a
BUSINESS POLICY AND STRATEGY
5. Reversal of the previous point is also val- OR THAT THE LOCAL LAWS HAVE
id – do not turn on the computer systems longer period of time, at least long
enough to create an action plan. Key BEEN VIOLATED, IT IS IMPORTANT
that are turned off, if they could have
been tools used in computer crime or questions are the following: TO DISCUSS THE HARD FACTS IN
system breaches, and it could also com- a) who should be informed within organi- COMPLETE CONFIDENTIALITY WITH
promise and delete traces needed for in- zation about the information security THE HIGHEST DECISION LEVELS
breaches
vestigation. WITHIN ORGANIZATION WHILE
6. The biggest damage that can be done by b) is the law broken
c) is it necessary to contact the police MINIMIZING THE NUMBER OF
„do-gooders“ from ICT departments is
d) is it necessary to contact the lawyers INVOLVED PEOPLE.”
usually done when trying to do an inter-
nal investigation. Area of computer fo- e) is it possible to conduct internal investi-
rensics is very complex and people who gation 6. The scope of investigation should be wid-
have high levels of computer education 2. It is advisable to make a list of used soft- ened outside of the organization’s perim-
are not necessarily people who can run ware and hardware and all compromised eter, in case it is so indicated. Is it possi-
computer crime and information securi- computer and other assets. This will ble that certain parts of misuse were done
ty breaches investigations. Unless the speed up the forensic process as such list to remote computers outside of the com-
personnel is authorized, has all the ade- can be readily submitted to those in pany’s perimeter, for example, using
quate forensic tools, and understands le- charge of investigation. This refers to all notebook or home personal computer?
gal implications of collected evidence media like floppy disks, CD and DVD What is the current location of such
contained within computers and compu- media, hard drives, USB hard drives, pen equipment and is their investigation go-
ter systems, it is quite possible that evi- drives, memory cards and digital photo ing to be of interest for the forensic inves-
dence could be corrupted, destroyed, or cameras. tigator? What should be done in order to
rendered not accepted in possible future 3. The list from previous item should be gain access to that remote information
legal proceedings. widened by further answering to the fol- processing equipment?
Once that we have established what not lowing questions – is it possible that oth- 7. In any case, the most important thing in
to do, let us put some emphasis on what to er computers other than those immedi- initial investigation of any perimeter breach
12 VARNOSTNI FORUM
VAROVANJE KONČNIH TOČK (ENDPOINT SECURITY)

is to preserve the computer systems sequentially discloses the perpetrator. How- important for the organization, because
from any kind of change. If the compu- ever, in most cases, the key is in the preven- along with the technical, organizational
ter system is turned off, leave it in such tion or the proactive behavior. There are and forensic response, it sometimes
state because turning it back on might five basic groups of measures that can be needed to address the issues of social en-
erase important evidence. If the compu- implemented in advance, in order to miti- gineering within the organization that
ter system is turned on, leave it turned gate these risks: might have granted unauthorized access
on but do not use it until it is accessed 1. Procedures of purchase and procurement to those entering the security perimeter.
by the forensic investigator, and ensure of hardware equipment should be aligned Sometimes, the organizations want to
constant power supply. In case of pe- with basic policies of internal and exter- identify a “single culprit” for certain se-
ripheral equipment powered by batter- nal perimeter security to ensure both curity incident, yet it is clear that multi-
ies like notebooks, mobile phones, land- service availability and data and systems ple points-of-failure are often the cause
line phones or palmtops, they should confidentiality and integrity. of a security breach. Therefore, the goal
not be used, but should be connected to of every organization should be in pre-
external power source to ensure that in “SOCIAL ENGINEERING AWARENESS vention and not reactive behavior. The
the case of deep battery drainage the IS USUALLY IMPORTANT FOR THE only way to mitigate social engineering
contained data does not get erased. ORGANIZATION, BECAUSE ALONG risk is to educate those that are in charge
8. In most cases, it is safe and advisable to of technical maintenance of information
disconnect the affected computer or
WITH THE TECHNICAL,
system components, and also to educate
computer system from the computer ORGANIZATIONAL AND FORENSIC their users.
and telephone network by physical re- RESPONSE, IT SOMETIMES NEEDED
moval of network and telephone cables, TO ADDRESS THE ISSUES OF SOCIAL “THE BEST ADVICE TO ALL
in order to preserve the evidence and ENGINEERING WITHIN THE CORPORATE ORGANIZATIONS AND
prevent remote access to computers and
ORGANIZATION THAT MIGHT HAVE EVEN MID-SIZED ORGANIZATIONS IS
distributed removal of evidence by the
perpetrator. GRANTED UNAUTHORIZED ACCESS TO HAVE EITHER UMBRELLA FRAME
9. Only after joint decision of decision TO THOSE ENTERING THE SECURITY AGREEMENTS, OR AT LEAST
makers in the organization, those re- PERIMETER.” ESTABLISHED CONTACTS WITH
sponsible for information systems, law COMPUTER FORENSICS EXPERTS OR
enforcement and forensic investigators, 2. Hardware and software systems that pre-
CONSULTANTS, IN ORDER TO
the passwords and logins for system uti- vent misuse of peripheral, exposed
lization should be changed, and e-mail equipment should be in place and aligned ENSURE RIGHT PERIMETER BREACH
rights and other privileges should be re- with real business needs. These systems AND INCIDENT RESPONSE.”
voked from those that are suspects in should be implemented in order to en-
the investigation in case of internal em- sure encryption, rights management on 5. Alignment of incident response with
ployee or internal third-party security certain services and document classes, goals of the organization. Very often the
breaches. This decision could signal impose service denial or limitation to risk of information security or secure pe-
them that they are under investigation certain groups of users, set priorities and rimeter breach is simply accepted, even
so it should be carefully made after use heuristics to identify possible breach- when it is very high, because the organi-
broad consensus. es and none granted attempts of access. zations silently accept their exposure by
10. All identified evidence should be ade- These systems in fact heavily rely on or- trying to minimize the costs related to
quately stored under lock and key or in ganizational component of ISMS and contracts, services, hardware and soft-
a safe, the list of taken steps should be they are only as effective as is internally ware that should be purchased or ob-
detailed with signatures of those re- established ISMS. Therefore, investing tained to mitigate the real risk. It is up to
sponsible for different steps. It is possi- in intrusion prevention software and every organization to carefully leverage
ble to include also external authorities hardware without investment in proce- the cost of possible data theft, corrup-
in this process to ensure evidence valid- dures and human resources can be some- tion, deletion or security breach against
ity and integrity, like public notaries, times expenditure that is not justified by yearly investments and costs related to
lawyers, forensic investigators, police obtained results, and that should be mitigation measures and possible con-
officers and other various trustworthy higher level of integral security of the tracts with third parties related to foren-
witnesses. system or organization as a whole. sic and incident response and even pre-
11. Finally, the best advice to all corporate 3. As already described, clear policies of vention. Most corporations still have rel-
organizations and even mid-sized or- ISMS implementation, detailed analysis atively modest numbers of in-house au-
ganizations is to have either umbrella of procedures and contingency proce- thorized forensic staff, so they should be
frame agreements, or at least established dures, communication channels and very careful not to fall in the trap of cost-
contacts with computer forensics ex- hardware resources, disaster recovery cutting where it is not exactly advisable.
perts or consultants, in order to ensure and business continuity and clear SLA Proven fact is that return of investment
right perimeter breach and incident re- with consultants that are specialists for on ICT forensics is clearly qualitative and
sponse. security incident response are both basic not quantitative – this is something that
Technical and organizational measures and clear prerequisites for effective man- stakeholders usually do not value highly.
that can be undertaken in order to prevent agement of security breaches in the or- It is even worse when ICT systems are
or mitigate the risk of perimeter breaches to ganization. These consultants typically not a part of overall business strategy but
any part of ISMS can either be proactive or offer services of incident management merely support functions. In such sce-
reactive. Forensic response described above on a technical level and they are special- narios, it is clear that there will be more
is a part of the reactive process that not only ized to stop any attack or mitigate already security breaches and also the forensic
establishes back endangered services, but done damage. and incident response will be difficult,
also manages the incurred damage and con- 4. Social engineering awareness is usually delayed and maybe inadequate.
< VI/MAREC 2010 > 13

Das könnte Ihnen auch gefallen