Sie sind auf Seite 1von 16

SOLUTION SPOTLIGHT

Next Generation Endpoint Strategy


Rafal Los, Director, Solutions Research

1
Introduction
Enterprises continue to suffer from the growing cost of breaches,
many of which originate at the endpoint, despite the compounding
deployment of security tools to these corporate assets. According
to the 2015 Ponemon Cost of Data Breach Study, the average cost
of a data breach is now $3.79 million USD thats a 23 percent
increase since 2013. Adversaries evolve and adapt even as security
tools continue to remain static, causing significant challenges for
defenders. The signature-focused, alert-centric reactive model for
endpoint security tools must evolve beyond currently deployed
capabilities to meet the growing productivity needs of the
enterprise in an increasingly hostile environment.

2
$3.79 million USD
Average cost of a data breach

3
2015 Ponemon Cost of Data Breach Study
Identifying the
Challenges

Business Perspective Endpoint security programs, which are key


components of a holistic enterprise security
strategy, are struggling to adapt to the rapid
The topic of corporate endpoint security escalation in adversary activity and to protect
is commonplace in the board rooms of the corporate endpoint in a more meaningful
enterprises large and small as the seemingly and effective way.
never-ending arms race with adversaries
whether they are activist, hacktivist or
corporate or nation-state sponsored yields Adversaries are winning
breach after breach. Business leaders look
to security executives to define security Furthermore, from anecdotal evidence,
strategies that are operationally mature business leaders are increasingly pushing back
while continuing to allow the business to against the additive security model hesitating
be agile and cost-effective, and to empower to add more obstacles to end user productivity
their workforce for maximum utility in while loading down endpoints with yet another
increasingly hostile environments. As more agent. As specialized tools are deployed by
security executives and professionals push security for prevention, detection, response and
their endpoint strategies into tighter alignment recovery tasks, it is inevitable that endpoints
with business objectives, the delicate balance slow down and system overhead increase. Even
between productivity, cost and security benefit with the additions of new tools, endpoint
remain a challenge. systems continue to be compromised because
there is a general lack of holistic integration
Even more frustrating for business executives between network, endpoint and various
is that as security spending increases, it never other security tools. Deployed technologies
seems to be enough. Executives are continually are inadequate and fail to address continually
frustrated that, no matter how much money changing threats as adversaries evolve tactics
and how many people they invest in security, and adapt quickly to static, pattern-based
they can always be doing more. Adversaries defenses. An evolution in endpoint security
are always a step ahead and a second faster coupling actionable threat intelligence with
meaning breaches continue to make headlines pro-active attack detection is required.
in spite of the rise in security budgets.

4
An Evolution on the Endpoints Detection Methods
In the course of engaging with clients on Static indicators as a detection method
security strategy engagements, the Office of of malicious activity continue to deliver
the CISO has discovered that a vast majority diminishing results as complex adversaries
of Fortune 1000 clients do not have adequate move beyond malware. To repeat, according
endpoint protection against even moderately to the 2013 Verizon DBIR, only 40 percent
advanced adversaries. Nearly all strategy of successful breaches were the result
roadmaps of these clients include a refresh of of malware. Adversaries are moving from
endpoint security tools with a heavy focus on dropping packaged malware as the primary
advanced threats and mitigations. method of attack to directly attacking browsers
and operating systems using tools built into
Overall, enterprises are looking to an evolution the operating system. These tools can include
on the endpoints to provide better tools to PowerShell or in-memory attacks which fully
decrease the impact of an infiltration or breach, execute without ever writing to disk, thus
decrease the dwell time of their attackers and traditional detection tools fail silently.
improve response and remediation capabilities.
Network detection tools offer scale, but lack the
ability to protect the corporate assets as they

Security Perspective become increasingly mobile. Relying solely


on network-based defenses quickly proves
problematic because many modern malware
The rise in high profile breaches come as no simply wait for the endpoint to leave the safety
surprise to enterprise security professionals. of the corporate perimeter before performing
As adversaries evolve and adapt, defenses have their tasks.
largely remained static even though more tools
are added on a regular basis, especially to the The inability to quickly and effectively
endpoint. Security still depends on signatures share critical security information puts
and patterns, and continues to focus on the enterprise security team at a severe
malware, which is responsible for a mere 40 disadvantage. A restrictively myopic view
percent of all breaches according to the 2013 makes defending against previously unknown
Verizon Data Breach Investigations Report threats extremely inefficient. To compound
(DBIR). the situation, hiring and retaining top-level
threat analysts continues to pose a challenge
The evolving adversary continues to be a for even some of the largest enterprises. The
problem for signature-based detection tools. result is a narrow perspective, inefficient use
Over the last decade these tools have attempted of available tools, and a continued struggle
to keep pace with adversaries by writing more to defend against adversaries that adapt and
signatures faster, and broadening detection overcome enterprise defenses.
capabilities. This approach has created multiple
problems. First, an adversary can adapt and
evolve their attack patterns faster than tools
providers can update signatures. Second, Only 40%
alerts from even a well-tuned detection of endpoint
platform can quickly overwhelm a security
breaches are from
teams ability to respond effectively. Finally,
many security tools still focus on network- Malware
based defenses while corporate assets become - 2013 Verizon Data Breach
Investigationd Report
ever more mobile.

5
Solution Analysis
Strategy of alerts a security organization ultimately
faces and shifts the focus from detecting and
remediating known threats to hunting and
As part of a holistic, defense-in-depth strategy, finding previously unknown threats. In this
the endpoint is a logical defensive control point manner security teams can be more effective,
for organizations that have maturing network focusing their workload on the truly significant
controls and still struggle with intrusions. security threats to the organization.
Minimizing dependence on reactive, alert-based
detection where the security organization
is notified post-facto of a security event is a
necessary evolutionary step. But this evolution
Prerequisites
to a more mature model of pro-active detection
of malicious activity known as hunting for In order to make this evolutionary journey,
indicative behaviors, is out-of-reach for many enterprise security teams must meet three
due to the shift in talent, processes, data and basic criteria. The IT organization must have
tools required. As security teams further the ability to manage endpoints effectively
mature and build out their defense-in-depth while the security organization must possess
capabilities, they are creating three-fold the operational capability to triage events
endpoint strategies. and perform appropriate incident response
actions.
First, there is a strong desire to incorporate
threat intelligence purposefully into the
Manage Endpoints
endpoint security mechanism to continually
understand and detect the latest known
threats. Second is the evolution of signatures
beyond post-facto indicators of compromise
(IOCs) to a pro-active indicator model which
seek to detect and stop unknown attacks earlier
in the attack lifecycle. Finally there is a gradual
move to push strategic functions, such as the
ability to hunt, out to a center of excellence
(CoE) approach. In many cases this translates
to outsourcing this capability to a third party or
centralized Security Operations Center (SOC). Incident Triage
Response Events
Operationally this decreases the volume

6
As a prerequisite, the IT organization must teams. Supplantive technologies are generally
have a well-operationalized endpoint preferred with minimal impact to the
management capability to identify, deploy endpoints resources and productivity high on
and manage software components of the the requirements list.
endpoint. The security organization, while not
R
 emote supportability Endpoint security
directly responsible for these tasks, relies upon
tools must be as operational outside the
the ability to utilize this capability through an
network as they are inside. Tools which
automated, on-demand platform to provide
only function fully when inside a defined
context to security events for prioritization.
corporate perimeter risk leaving the endpoint
This collaboration highlights the necessary
exposed, as many endpoint devices are mobile
interdependency between enterprise security
and operate in increasingly diverse and
and enterprise IT, and emphasizes solid
hostile environments.
fundamentals as a baseline requirement for
any advanced capabilities. C
 omprehensive coverage The
expectation that all corporate endpoints
Additionally, enterprise security must have
will be homogenous is unrealistic in todays
or must be developing the operational
enterprise as Windows, Mac OS, Android,
capabilities including processes and human
iOS and others jockey for share of corporate
resources as necessary to triage the events.
endpoints. Endpoint tools should provide
Endpoint security monitoring will then
coverage of an enterprises full environment
identify and perform requisite actions. Without
from a single, centralized tool.
the ability to triage and properly respond, even
advanced endpoint tools are relegated to best-
guess based on a combination of signatures
and statistical models which dont take into Tactical
account an enterprises unique operational and
An endpoint security solution requires
resource constraints.
operational and tactical support to be
effective, including the following:
Operational Guidance C
 ontextual analysis Endpoint tools
which rely only on hashes and patterns
Strategic fall victim to the malware arms race that is
created as adversaries easily mutate their
Endpoint security must be considerate of
payloads to bypass detection. Endpoint
corporate endpoint operating parameters,
security tools today must use a combination
meaning strategy must take into account
of pattern detection and anomaly analysis
the way that endpoints are used to enable
while incorporating threat intelligence
and support the business.
where practical. Furthermore, tools that
M
 inimal impact during deployment, have the capabilities to leverage multiple
operation and maintenance Endpoint endpoint environments through anonymized
security must limit the impact on the information sharing or cloud services have an
productivity of the endpoint. Reboots, advantage over local only approaches.
resource utilization and compatibility
S
 ecurity Operations Center To effectively
concerns must be tested and vetted before
manage security of the enterprise holistically,
standardizing on a tool. Most endpoints are
a security operations center must be set
already overloaded with security agents (from
up to provide a clearing house for inbound
disk encryption to anti-virus and e-discovery
intelligence, tooling, analysis and response
for starters) so adding an additional agent will
for escalated security events. Endpoint
generally receive push-back from operations
security must have effective integration

7
into this core security operations function, Capabilities *
being able to both consume external and
internal intelligence and collaborate on event D
 ecreased impact of infiltration With
prevention, detection, response and recovery. the addition of external threat intelligence
Additionally, the advanced capability to move and decreased reliance on signature-based
beyond signatures and to hunt becomes a detection, it becomes possible to detect
crucial function of the SOC. threats earlier in the attack lifecycle. The goal
is to identify and stop attacks in progress
R
 esponse and remediation support where possible and thereby reduce the
Enterprise endpoints should be expected impact a successful infiltration may have on
to experience attack on a regular basis. The the organization.
endpoint security suite must lend itself to
integration with response and remediation D
 ecreased dwell time of adversaries As the
support to continuously and quickly identify security organization develops the capability
and shut down incidents before they to detect malicious activity faster, it decreases
become catastrophic a concept known the amount of time that an adversary will
as continuous response. It is beneficial if have to move around within the victims
endpoint security tools can perform remote networks after a successful infiltration. This
data collection and remediation procedures diminishes effectiveness of the adversary in
to minimize the amount of high-touch achieving their objectives.
interactions a security incident response
I mproved response and remediation
organization has with the endpoints. This
capabilities A key result of improved
minimizes negative impact to productivity
visibility and comprehensive profiling of an
and potentially the impact to cost of incident
adversary is being able to tell the difference
response as well.
between an opportunistic malware infection
(generic) and a determined adversary
(persistent). Knowing the threat type leads
to better prioritization, more purposeful
The endpoint security suite
response, and more complete remediation.
must lend itself to integration Furthermore, endpoint tools should play a
pivotal role in incident response procedures,
with response and remediation often being at the focus point of the incident.
support to continuously and Mature endpoint tools should provide
operational visibility through data and
quickly identify and shut down telemetry and response capabilities through
containment, remediation and remote-
incidents before they become response.
catastrophic a concept known *For clarity, it is necessary to note here that
as continuous response. what is being discussed is an evolutionary
step beyond what is commonly referred to as
traditional anti-virus endpoint tools.

8
Measure and Improve can quickly help demonstrate value by
showing the positive impact of the solution
on lost productivity and cumulative times to
As with any undertaking, it is extremely remediation.
important to set goals and measure relative
M
 alware-to-incident ratio Measuring for
distance to these goals. Endpoint security may
the deceased impact of an infiltration, this KPI
directly impact end user productivity and thus
measures the number of malware catches
must be carefully controlled and measured against the number of incident response
for that business impact. Measuring impact actions generated for those catches. We look
of a program item, such as endpoint security, for a drop in the number of incidents even as
to pre-defined and business aligned goals and malware rates continue to rise, reaffirming
objectives provides concrete evidence of such a that a successful malware infiltration onto an
program. endpoint or system does not guarantee victory
for the adversary or a requirement for an
When thinking about endpoint security, one incident responder.
must consider Key Performance Indicators
(KPIs) such as workload optimization, A
 ttacker dwell time This KPI measures the
productivity gains, incident reduction and time from when a piece of malware or attacker
is identified as first infiltrating a system to
proactive detection.
when that attacker or piece of malware is
It is important to establish a set of goals before successfully removed from the endpoint.
embarking on an endpoint security program What we are looking for is a systemic decrease
or project. What are the key things that the in how long an attacker has free reign on our
endpoints before they are caught and ejected.
program should accomplish? What is the state
of those things now and can it be measured? I ncident close rate One of the most
How much of a difference is an investment important KPIs that endpoint tools support
in endpoint security tools expected to make? is the rapid remediation and closure rate of
These are all questions that should have incidents. With better tools, responders can
formulas for answering them as the program more quickly get inside the attackers kill
progresses. chain and stop the attack. One good way of
identifying improvement is the number of
Possible Key Performance Indicators (KPIs) incidents a responder can close in a shift.
include

T
 ime-to-detection A quantitative way to Measuring and Improving
demonstrate the value of a next-generation
endpoint strategy is to compare it against
existing tools in similar situations for the
detection of threats. Traditional pattern-based
solutions will have a significantly longer
time to detection, especially on previously Time-to-detection
unknown threats versus next-generation
solutions that rely on a much richer set of Incident close rate
indicators.

T
 ime-to-remediation One of the key value
drivers of a next-generation endpoint solution Time-to-remediation
is the additional capabilities that serve to
decrease the time it takes to remediate a
potential issue. The ability to compare existing Attacker dwell time
remediation times using current endpoint
tools against a next-generation solution
Malware-to-
incident ratio

9
Case Study in
Next Gen Endpoint
Organizational Profile and risk-based models for dealing with
attackers. Even though malware continues
to be a problem for the enterprise, it is the
The organization featured in this case study adversary that is proving truly worrisome.
is a global financial services provider with The determined attackers that take the time
a diversity in assets, products and global to understand the enterprise often better
presence. In order to adapt to a growing threat than it understands itself and custom-craft
climate, the organization sought to provide attacks that bypass existing signature-based
additional layers of security beyond traditional threats force the system to fail silently. In
security tools such as endpoint anti-virus. these scenarios, attacks are missed and the
The move to a next-generation endpoint enterprise often finds out about a high-profile
was seen as strategic and necessary to detect breach and exfiltration of critical assets from a
sophisticated adversaries inside the perimeter third party or worse, the media.
to globally reduce risk to the enterprise.
The globally diverse corporate endpoint At the same time, business leadership is
infrastructure necessitated a solution that can pushing hard to keep the enterprise safe
enable the security team to identify previously from both known and unknown threats.
unknown threats faster before the adversary Threats that are currently unknown such as
can achieve their objectives. nation-state adversaries, organized crime or
industrial espionage are both well-funded and
persistent and adapt their attacks to the target.
Challenges Business leadership needs accountability, cost-
containment and certainty in the tools the
Business Perspective security organization is utilizing.

Businesses have developed mathematical

10
Technology Perspective 2. Forensic insight (hunting capabilities)
3. Ease of deployment throughout the
As adversaries evolve, traditional endpoint
environment
security approaches are simply not keeping
pace. Making the assumption that determined 4. Superior user interface of the management
adversaries will eventually gain access into the console
network, it becomes important to understand 5. Lightweight nature of the endpoint agent
their methods, movements and actions to
effectively determine a course of action. The capability to deploy a single, unified
Existing tools were inadequate for this task, so agent across servers and workstations
an alternative was sought. decreases the amount of work an operations
team would need to do to package the tool
At the core of the problem was the inability to
for deployment thus making this feature
detect lateral movement from compromised
incredibly underrated and critical to successful
endpoints. As a result, adversary dwell time
deployment. Because the agent is lightweight,
was unknown but assumed high and
deployment was refreshingly low-stress across
the enterprise security teams visibility was
a diverse environment, primarily based on
extremely limited. When a compromised
Linux and Windows endpoints and does not
endpoint was discovered, there were no
consume memory, CPU or disk resources
immediately available tools to aide in
to cause end user productivity issues. In
determining what actions that compromised
large environments where endpoints are in
endpoint may have taken, where an attack
what feels like a continuous update cycle,
originated (if not at that endpoint), and the
the lightweight nature of the Falcon agent
scope of the resultant breach. Furthermore,
definitely aided its deployment success.
adversaries that did not utilize malware for the
attack were not being detected at all. Security tools, not unlike most other IT tools,
can succeed or fail based on the management
console or dashboard. Management consoles
Solution Approach that are designed with product use cases
in mind streamline workflow and optimize
use of precious human resources. When
Solution Chosen investigating a potentially critical security
To alleviate the enterprise security teams issue within the environment, a clean, simple,
challenges, CrowdStrike Falcon Host was well-designed user interface can mean the
chosen. Selected for its ability to detect difference between stopping an adversary and
unknown unknowns as well as pattern-defined spending an afternoon trying to find the right
threats, Falcon was utilized on both servers information to make the decision.
and workstation endpoint systems. Falcon
Additionally, the advanced ability to hunt
was selected for its unified visibility on both
or query system parameters and data in near
workstation and server endpoints, and because
real-time becomes pivotal when looking
it directly incorporated CrowdStrikes extensive
beyond pattern detection. As adversaries
threat intelligence knowledgebase into the
evolve it will continue to be more and more
product.
critical that enterprise security organizations
move beyond pattern-based threat recognition
and malware signatures. Malware-free
Desired Capabilities
intrusions which use custom-crafted attack
There were five key factors in the selection of vectors are likely to continue to increase,
CrowdStrike Falcon Host. thereby making tools that aid the human
analyst in detecting system-based anomalies
1. Unified server and workstation visibility that are indicators of compromise that much
from a single agent and management more indispensable.
console
11
Solution Components function. The simplicity and ease-of-use of
the management console facilitated rapid
CrowdStrike Falcon Host for servers and adoption from training to finding over 200
workstations new and previously undiscovered issues in
the environment.

Where CrowdStrike really stands apart


Operationalizing
from the competition as a partner is in the
The most critical task for any piece of security integration into the security operations
component deployed in an enterprise setting function.
is the operationalization of that component.
The security team truly partnered with
Taking a tool and integrating it into the
CrowdStrikes Security Operations Center
workflow and culture of an organization
(CSOC) who in addition to hunting for
cannot be overstated. That being the case,
unknown threats also provides direct
the CrowdStrike solution has truly become a
additional operational feedback and support
partner with this organizations security team.
on next steps for issues encountered.
Executive management allocated
This direct relationship with CrowdStrikes
approximately one quarter for full rollout and
talented and knowledgeable CSOC team
operational efficiency, and the CrowdStrike
provides guidance, leadership and directly
team was able to achieve deployment and
actionable information unavailable from
operational stability within an amazing two
other next-generation endpoint providers
days.
due to their wealth of threat intelligence
The team deployed to 75,000 desktop capabilities.
endpoints and 10,000 servers with minimal
operational overhead, no downtime and no
issues. Strategic Benefits of
This tremendous success has led the CIO CrowdStrike Falcon Host
of the organization to hold this specific
Addressing complex security challenges
deployment as a gold standard for all future
often requires complicated implementations,
deployments of security tools.
extensive deployment cycles, training and
The full integration of the Falcon Host Next- process building. Utilizing CrowdStrike Falcon
Generation Endpoint required deployment Host, the organization in this case study was
into the standard images the organization was able to not only deploy rapidly with minimal
deploying to ensure it was installed by default. impact, but was also able to quickly realize
This was achieved quickly at both the desktop value from the solution by detecting attacks
and server level as success with the desktop that other tools were missing. The value that
team was recognized and adopted quickly by is derived from a new security tool which
the server organization. Additionally, training, requires minimal organizational friction to
playbook creation (operational guides) operationalize should not be overlooked.
and hunt queries were rapidly developed
From a strategic perspective, the benefits
and deployed through the support of the
of the CrowdStrike Falcon Host solution
CrowdStrike team to ensure rapid uptake.
include the ability to identify sophisticated
As part of the operational strategy of the and complex adversaries which traditional
Falcon Host NGE, the organization brought security tools miss. Adversaries who take
on board new headcount to begin to leverage the time to understand and design attacks
the newly deployed capabilities. The new against your environment wont be caught
capabilities to hunt required specialized with the tools deployed today. They require an
skills and thus a team of five new analysts advanced toolkit which can not only identify
were brought on board to fulfill that previously known patterns but also assist with
12
the discovery and assessment of previously to protect key enterprise endpoint assets to
unknown attacks. This ability to detect and the point where these network-based threat
identify the unknown unknowns adds value mitigation tools are unnecessary.
to organizations that have already optimized
signal-to-noise in their reporting dashboards
and require the capability to detect and respond
to complex attacks. For this organization, the
CrowdStrike Falcon Host tool is a key partner The security team believes
in their long-term strategic security program
and their continued development of advanced the Falcon Host solution
detection and response capabilities.
is sufficient to protect
key enterprise endpoint
Results and Measured assets to the point where
Improvement these network-based
threat mitigation tools are
The degree of success of any security program
or initiative can be measured as the ratio unnecessary.
of security benefit against the additional
business interference created. By this measure
the CrowdStrike deployment has been a
true success. With a two-day deployment
cycle across 75,000 workstations and 10,000
servers, including training and initial use case
creation while generating no negative end
user or operational impact, measured against This portion of the spotlight is a vendor-sponsored
the discovery of over 200 new security issues case study. Content and views set forth in this
previously undetected by other security tools, portion of the spotlight are those of the vendor
and/or the vendors customer. Optiv does not
the Falcon Host NGE achieved rapid value with
endorse, support, represent or guarantee the
minimal to no interference. These results speak
completeness, truthfulness, accuracy or reliability
for themselves. of any content or views in this portion of the
spotlight, and Optiv disclaims responsibility, and
As the security team continues to use the will not be liable for, such content and views. Optiv
toolset, they measure the amount of new does not endorse any specific software, hardware,
attacks and adversary actions that are caught services or solutions.
through the Falcon Host NGE. This net-new
discovery metric clearly shows the value that
this solution brings to the organization.

One tremendous advantage to the CrowdStrike


solution has become the potential for cost-
savings by removal of redundant tools. As the
value of the next-generation endpoint solution
becomes fully realized, it is possible that the
dependence on network-based threat detection,
sandboxing and mitigation tools can be
reduced to the point where many of these tools
can simply be discontinued. The security team
believes the Falcon Host solution is sufficient

13
Lessons Learned
While there is no end in sight to the arms race between attackers and
defenders, the tools at the disposal of enterprise security professionals are
dramatically improving.

I n the defenders toolbox, the Next-Generation Endpoint (NGE) category

of tools is proving that an evolution in the way that endpoint security is


handled is both necessary and available.

T
 he next-generation of endpoint tools are supporting the operational goals

of decreasing both dwell time of adversaries, and the impact of their actions
while adding to the response and remediation capabilities directly.

T
 he direct support of incident response capabilities helps scale the most

precious resource humans.

For more information about next generation endpoint strategy, please contact Optiv
Solutions Research and Development SolutionsResearch@optiv.com

14
15
1125 17th Street, Suite 1700
Denver, CO 80202
800.574.0896
www.optiv.com

Optiv is the largest holistic pure-play cyber security


solutions provider in North America. The companys di-
verse and talented employees are committed to helping
businesses, governments and educational institutions
plan, build and run successful security programs
through the right combination of products, services
and solutions related to security program strategy,
enterprise risk and consulting, threat and vulnerability
management, enterprise incident management, securi-
ty architecture and implementation, training, identity
and access management, and managed security.
Created in 2015 as a result of the Accuvant and FishNet
Security merger, Optiv is a Blackstone (NYSE: BX) port-
folio company that has served more than 12,000 clients
of various sizes across multiple industries, offers an
extensive geographic footprint, and has premium part-
nerships with more than 300 of the leading security
product manufacturers. For more information, please
visit www.optiv.com.
2015 Optiv Security Inc. All Rights Reserved.
7.15 | F1

16

Das könnte Ihnen auch gefallen