this is the archive page

Cyber Insurance, part 2: Getting ready for the insurance company questionnaire!

Ok, so you have read my first post about cyber insurance, and you have determined that you need it.

General guidelines for what you should review before calling your cyber insurance agent

What do you need to know before you call your insurance agent?

Over the past ten years or so, the insurance questionnaire has gotten longer and longer, with more and more detailed questions about the data you keep and the controls you have in place to protect that data.

If you have a good security program in place, then answering the questions won’t be hard. If you have a program in place but you have gaps, you need to know what those are before making that phone call.

If you have no program in place, you might not qualify for insurance at all.

What do you need to know first?

Here are some general guidelines for what you should review before you call your agent.

Start with your information security risk. These questions are similar to what your car insurance agent asks to gauge how risky you are to insure, questions like: How old are you? Are you married? Have you had any accidents recently? What kind of car do you drive?

For cyber insurance the questions are more like these:

Q. Do you or your company collect, store, process, or transmit protected or sensitive data, like credit cards, Protected Health Information (PHI), or social security numbers?

  • If you answer yes to this question, you will have regulatory requirements to maintain, process, collect, store or transmit this data. Those requirements help provide guidance on the controls you need to have in place.
  • Then you will have to check boxes to qualify the kinds of data in your control.
  • Next, you’ll be asked how many records with protected or sensitive data you have or process or transmit: 100? 1000? 10,000? 100,000? More?
  • You will also have to share how many unique individuals you collect protected or sensitive data for. Notice this is similar to the preceding question but is not the same.

Q. Is your company subject to any specific regulation, like GDPR, HIPAA, FERPA, SOX, GLBA, CCPA, PDPA, PCI-DSS?

  • If you answer yes to this question, you will have guides or requirements you need to follow to be compliant with these regulations. You might not know that you have requirements, but you do, so get the appropriate guide(s) that will help you follow those regulations.
  • In this vein, are there any industry security frameworks that you have to follow, like NIST or COBIT?

Read more: Can you be ransomware-proof? Is that even possible?

Q. Do you allow your employees to use portable devices to work on your data, like laptops or their own devices?

  • Portable devices are really nice, but they involve additional risk. Most of the risk is related to loss of data, either by physically losing the device (i.e., data loss) or having data on the device compromised or stolen (other people use the laptop and accidentally infect the machine or copy or delete sensitive data).

Q. Do your vendors or third-party contractors have access to your computer systems?

  • If you grant third parties’ access to your computer systems and data, do you know what kind of security controls they have in place?
  • Could they be infected with malware that then infects your computers? Would you know if that happened?
  • Do you audit your third-party vendors or suppliers?

Q. Do you have a formal information security program?

  • Do you have any information security policies?
  • Do you have a person or role that is responsible for information security at your company or organization?
  • What is the budget for your information security program?

Read more: Essential security practices to protect your business

In addition to those questions about your information security program, be prepared for detailed questions about your network and system configuration, such as:

  • Do you have a firewall? Who is the vendor, and do you keep it updated?
  • Do you have antivirus software on your servers and workstations? Do you keep it updated?
  • Do you have a network Intrusion Protection System (IPS) or Intrusion Detection System (IDS)? Do you keep it updated?
  • Do you have an anti-spam device to block phishing e-mails?
  • Do you require Multi-Factor Authentication for network and e-mail access?
  • Do you require complex passwords?
  • Do you require passwords to expire?
  • Do you have policies and procedures for network access, account creation, and acceptable use policies?

What else do the insurance companies want to know?

Because you likely do not operate in a technological silo, you will have to answer questions about any cloud service providers you use for your business.

  • Does your cloud service provider have a security program?
  • Do they audit their security program with a third party?
  • Can they provide a SOC type 2 report?
  • Can they meet your security requirements (like GDPR, SOX, HIPAA, FERPA, etc.)?

Sometimes the insurance questionnaire will ask about the contracts you have with your customers, looking for information like:

  • Do you use contracts with your customers?
  • Do your customer contracts have “hold harmless” clauses?
  • Do your customer contracts get reviewed by your legal team?

There can be additional questions depending on your industry, but these are the kinds of questions you should prepare to answer when you start looking for Cyber Insurance.  In my next blog post I’ll show you how to get prepared if you have gaps or do not have a security program in place.


John Bruggeman’s Cyber Insurance series:

Part 1: What is Cyber Insurance and do I need it?

Part 3: Cyber Insurance, part 3: Filling out the questionnaire


More tools for your cybersecurity toolbox from CBTS Consulting CISO John Bruggeman:

Getting ransomware-proof, continued: CIS controls for medium-size organizations

Improve your cybersecurity defense with centralized logging

Improve your cybersecurity defense with centralized logging, continued: A deeper dive!

Zero Trust Networks (ZTN): what are they and how do I implement one?

Cyber Insurance, part 1: What is Cyber Insurance and do I need it?

Many companies these days either have cyber insurance or are thinking about purchasing it. It’s a smart choice given recent ransomware attacks and the risk to a company locked out of its critical business systems or important business files for hours or days or weeks. If the risk of ransomware isn’t already on the CEO’s and CIO’s minds, a business e-mail compromise (BEC) or funds transfer fraud attack may have popped up on the risk registry in the quarterly Board meeting. 

But what is cyber insurance and does your company need it?  I will tackle these questions and others in a series of blog posts to help you make an informed decision.

What is cyber insurance?

What you get with cyber insurance—or more technically, Cyber-Liability Insurance—is a policy that helps mitigate the fallout or impact of a cyber attack, ransomware incident, or other technology event covered in the policy. Cyber insurance can help transfer the risk of a ransomware attack, BEC, or fund transfer fraud from your bottom line to the insurance company.

Read more: Getting ransomware-proof, continued: CIS controls for medium-size organizations

Do you need cyber insurance?  

The answer to that question is: It depends.

The minimum questions you want to ask yourself are:

  • Do you have PII (Personally Identifiable Information) that has to be protected?
  • Do you have a website that takes orders and stores credit card information (credit card data)? 
  • Do you have PHI (Protected Health Information) that you need to protect? 
  • Do you have intellectual property that needs to be protected?
  • Do you have other protected or sensitive data that needs to be protected (FERPA, CUI, ITAR, EAR, etc.)?
  • Does your company use automation to produce or ship your products?

If you answered yes to any of those questions then you probably need it.

Read more: How do you ensure the security of your supply chain?

What do you get with cyber insurance?

It depends on the policy of course but generally policies provide the following coverage:

  • Cost to recover data or systems—and sometimes losses incurred by your business—from a cybersecurity event, like ransomware or a DDoS attack.
  • Cost to perform forensics if required or needed by you or your legal team.
  • Payment of the ransom for encrypted data or lost funds in transfer fraud.
  • Costs of legal defense if needed after the event.
  • Cost to make customers whole if needed.

Some policies can also assist in these ways:

  • Help create your incident response plan.
  • Provide online training material for your employees to improve cybersecurity awareness and defense.
  • Provide a team that will help if you are hit with a ransomware attack.

What does cyber insurance cost?

The cost varies from insurance providers and for the coverage you choose. A number of variables will impact the cost of insurance: 

If you are a small company with a limited number of customers and limited exposure, cyber insurance could be very affordable. If you are a medium size customer with hundreds or thousands of customers and more exposure, you could be looking at several thousand or tens of thousands of dollars per year.   

In my next blog post I’ll talk about what you need to have on hand to prepare for answering the questions that the insurance companies will ask.

Need more help with your cyber defense? Contact the CBTS cybersecurity team today.


Cyber Insurance series from John Bruggeman:

Part 2: Cyber Insurance, part 2: Getting ready for the insurance company questionnaire!

Part 3: Cyber Insurance, part 3: Filling out the questionnaire

Part 4: What do you do if your cybersecurity insurance policy is denied?

Stocking your cybersecurity toolbox?  Read more from CBTS Consulting CISO John Bruggeman:

Improve your cybersecurity defense with centralized logging

Improve your cybersecurity defense with centralized logging, continued: A deeper dive!

Zero Trust Networks (ZTN): what are they and how do I implement one?

The basics of Incident Response Planning: how do you do it?

Since we are in the middle of Cybersecurity Awareness Month, I want to know about your incident response plan or IRP. When you created your cybersecurity program, how did you go about developing an incident response plan for your information security team? What steps did you take? Who did you involve?

Some of you might be thinking, “I don’t have time to create an Incident Response Plan, John!”

Well, ok, I understand that, but think of this analogy: You are the coach of a high school basketball team, and you’re getting ready to play your first league game. Have you practiced at all? Have you run a few drills? Do you know who on your team is good at shooting the ball? Who’s good at passing the ball? Who’s good at defending? Who do you want as the captain of the team? Who do you not want on the team? Who might be best holding a clipboard or keeping score?

Would you put your team on the court without any plan or any practice? I don’t think you would. You would want to be as prepared as possible before you put your team on the court.

So today I want to talk about the basics of creating your IRP, about planning and being prepared for something more dangerous to you and your company than a basketball game.

An IRP can be customized for your specific company or organization of course, but you will want to cover this basic format for three general types of incidents: High, Medium, and Low. Sometimes these are called Priority 1, 2, or 3 incidents and sometimes they are given colors, like red, yellow, and blue. Regardless of the scale you use, the following information below is a general guide for WHAT you want to do when you respond to an incident.

High Level Incidents or Priority 1

Suggested steps for response and remediation for High Level Incidents or Priority 1 (Examples: Active ransomware, data exfiltration, or other obvious malicious activity)

Time frame to respond: 2 hours or less

  1. Assess the size and scope of the incident. Investigate alerts from end point security tools or intrusion detection systems and log any new detections.
  2. Isolate affected endpoint(s) from the network to prevent malware from moving laterally throughout the environment using network management tools.
  3. Kill running process(es) associated with malware if possible.
  4. Delete malicious binaries if possible.
  5. Block command-and-control IP addresses at network perimeter firewall.
  6. Ban malicious MD5 or SHA2 hashes with whitelisting tool or other relevant product.
  7. Remove persistence mechanisms (scheduled tasks, autorun keys in the registry, etc.).
  8. Minimize risk of a future attack by identifying vulnerability used in the attack and implement technical or administrative controls.
  9. Review account usage involved in the incident and reset passwords, limit administrative access where possible, and disable unnecessary file-sharing access.
  10. Re-image infected systems and patch identified vulnerabilities
  11. Mark relevant detections and alerts as repaired in Incident tracking tool.

Escalation Procedure

  1. Helpdesk or MSP will contact appropriate incident responder(s) based on pre-determined asset value/department/data owners, who will initiate pre-defined response plan specific to the severity and type of incident.
  2. Complete scoping assessment to determine which systems and data were affected by the incident.
  3. Notify appropriate personnel if scoping assessment determines that the sensitive data was affected by the incident and escalate as needed.
  4. Notify relevant managers when the incident has been successfully resolved/remediated.
  5. Prepare post-incident report documenting response process and distribute to appropriate personnel.

Medium Level Incidents or Priority 2

Suggested steps for response and remediation for Medium Level Incidents or Priority 2 (odd behavior from web browser like redirecting to support website, or desktop application requesting login credentials)

Time frame to respond: 2-4 hours

  1. Assess the size/scope of the incident.
  2. Investigate alerts from network and endpoint security tools and acknowledge any new detections.
  3. Isolate affected endpoint(s) from the network to prevent malware from moving laterally throughout the environment.
  4. Kill running process(es) associated with malware if possible.
  5. For suspicious activity, investigate details within endpoint data and determine if behavior is legitimate or malicious.
  6. Delete any malicious binaries present on the end point(s).
  7. If possible, block malicious files via MD5 or SHA2 hashes with AV or End Point protection tool.
  8. Mark relevant detections and alerts as resolved/remediated.

Escalation Procedure

  1. Helpdesk or MSP will initiate remediation within 2 to 4 hours.
  2. Document response actions and notify management as needed upon repair/remediation.

Low Level Incidents or Priority 3

Suggested steps for response and remediation for Low Level Incidents or Priority 3 (adware, add-on search toolbars, peer-to-peer software)

Time frame to respond: 24–48 hours

  1. Acknowledge detection(s), open a helpdesk ticket.
  2. Kill running process(es).
  3. Contact affected end user.
  4. Uninstall unwanted programs.
  5. Mark as remediated.

Escalation Procedure

  1. Helpdesk or MSP will fix/remove the malware within 24 to 48 hours, depending on SLA.
  2. Document response actions and notify management as needed upon repair/remediation.

If creating an incident response plan still looks like more work than you have time for, remember that cyber attackers spend all of their time looking for your network’s weak spots. Like any good game plan, your IRP will create a stronger, more nimble team with the skills to respond to those attacks and beat your opponents.

After you make you plan with your Information Security Team (even if it’s your regular IT guys who have a dual role doing InfoSec), you need to practice it. Not every day, but once a quarter. Then again, depending on your environment, you might end up practicing it every day because you have a lot of incidents. I hope that’s not the case, and I hope this helps you and your organization on the road to a safer and more secure work environment.

Need more help with your cyber defense? Contact the CBTS cybersecurity team today.

More tools for your cybersecurity toolbox from CBTS Consulting CISO John Bruggeman:

What is Cyber Insurance and do I need it?

Can you be ransomware-proof? Is that even possible?

Getting ransomware-proof, continued: CIS controls for medium-size organizations

Improve your cybersecurity defense with centralized logging

Improve your cybersecurity defense with centralized logging, continued: A deeper dive!
Zero Trust Networks (ZTN): what are they and how do I implement one?

Essential security practices to protect your business

Merry Cybersecurity Awareness Month! It’s going well, isn’t it? I think we are collectively more aware than we’ve ever been about the risk we face, as consumers and also as professionals.

Why do so many individuals and businesses live in fear of cyber attacks? Many customers I talk to still feel they are vulnerable in a dozen different ways. They might believe parts of their security stack are sufficient but also that attackers nowadays are insidious, capable, and determined. Cyber criminals are motivated by money and power; hacktivists have a cause to champion; state-sponsored attackers’ goals range from espionage to intellectual property theft to political and military impact.

Read more from Justin: Cybersecurity Guidance from the Top

We at CBTS believe that a strong security program that protects your data and assets will involve a basic set of practices that are essential—no matter how large or small, what industry you’re in, or what data you are responsible for. Those practices won’t save you from every attack, but you’ll certainly be better defended against opportunistic, less-skilled adversaries.

The challenge for most organizations is that those practices are tough to start. They require the right tools, people to run them, and rigorous procedures that will ensure their effectiveness. We see businesses start moving in the direction of these practices but over time, devotion to them wanes as other priorities crop up, or other projects demand the attention of the staff.

Outsourcing some of the effort of security operations in response to this challenge has been a helpful approach. It reminds me of an episode of Star Trek: The Next Generation (of course).

In it, the crew of the USS Enterprise is subjected to a virus causing them to slowly devolve into other lifeforms—their behavior begins to resemble that of a primate, a spider, a reptile. One of the crew, Lt. Worf, begins to exhibit violent tendencies. After Worf injures another crewmember, he goes into hiding. In command of the Enterprise, Commander Riker wants to find him, but the effects of the virus are affecting Riker’s brain, and he’s not thinking clearly. When Lt. Cmdr. Geordi LaForge comes and asks to help find Worf, the exchange is pretty funny:

Commander Riker asks Lt. Cmdr. LaForge to take care of that security thing.

LAFORGE: Commander, I’ve got seven security teams out hunting for Worf, but for some reason sensors are having a difficult time locking into him. I’ve called for a level two security alert. Do you think we should go to a Level One?

RIKER: (Pauses, clearly stumped)… I don’t know. What do you think?

LAFORGE: I think we should.

RIKER: Okay. Sounds good. …Then you’ll take care of that…security thing?

LAFORGE: Yes, sir. I will

Often this is what we face as a security services company: Customers having trouble knowing what security practices to implement and how to implement them. This is why we’ve built our Managed Security team—to provide a set of essential security practices to our customers, consumed on an as-a-service basis.

Read more: Why should you do information security awareness and training?

These essential practices—security monitoring, vulnerability management, endpoint protection, multifactor authentication, and backups—should be a part of every company’s core security function. Can you imagine a front door without a lock, or a bank without security cameras? Going into 2022, any business with information that resides on computers connected to a network must invest in these practices or face serious risk of theft, ransomware, and other threats. Interested, but don’t know where to start? We hosted a webcast to talk more about these practices, as well as some tools that work well to map out a strategy to start doing them.

Read more: A suite of essential security services is the foundation every business should have.

Watch the Security Practices & Tools Webcast


Need more help with your cyber defense? Contact the CBTS cybersecurity team today.

Read more blogs from Justin:

Top 5 cybersecurity actions to take right now

5 questions you’ll need to answer for an improved security posture in 2021

You Virtualized My CISO! Security leadership with a virtual CISO

Zero Trust Networks (ZTN): what are they and how do I implement one?

One of the many buzz words in Information Security media today is Zero Trust Networks or ZTN. I like a good acronym as much as the next person (it is easier to type for sure), but it can be hard to understand how you as a CIO can implement a ZTN.

In a sense, a ZTN is what most of us do every day when we walk or drive to an unfamiliar place. Imagine you live in a city or suburb and you’re heading to a new restaurant but you don’t know the neighborhood for this hot new place.  

What do you do?

Do you treat this new neighborhood like your own, where you know everyone and know who and what you can trust? No, of course not.

You take some time to get context (in other words, understanding) about this new place to see if you can safely and easily park your car or lock up your bike or walk to it for dinner. You scope out the area to figure out how safe things are in this new environment.

The new bistro has to scope you out, too. Are you safe? Are you someone who can be trusted to pay the bill at the end of the meal? Do you present a threat to them?

You don’t trust the new neighborhood randomly and they don’t trust you right away either.

How does this play out in the information security space?

The average company today has multiple vendors that either provide a service or are customers that need access to your network/services. As the CIO you have created a very secure, private network, that typically has a VPN for remote access, and you have vendors providing services or consuming services that are outside of your trusted network. See this basic diagram below:

An example network diagram

You can make this diagram more complicated with a DMZ, load balancers, web application firewalls, cloud services, and other things, but this covers the basic environment.

Where are the risks to you and your vendors?

There are three basic threat vectors for modern networks.

  1. A user may have compromised credentials that can be used in an attack to gain access to your network or your vendor’s network.
  2. A device may be compromised on your internal network, your vendor’s network, or the remote network. That compromised device can then attack you and/or your vendor(s).
  3. A software system—like an API—can be compromised and that can impact or infect data on your network, the vendor’s network, or the remote workers.

If you think about the number of devices you have, the number of users, and the number of vendors, you can see how the risk to you and your vendor partners has increased exponentially.

Where does Zero Trust come into this story?

Remember how I started this post by saying you want to go to a cool, new bistro in a neighborhood that is new to you? You (and your vendor partners) need to figure out who you can trust and what is accessing your network. In this case the new bistro is virtually everyone and everything connecting to your network. You have to treat your users, your computer systems, and your vendors as if you do not know them.

How do you do that?

Often this is accomplished with tokens (or a security certificate) that are assigned to a user, or a device, or even a program, after identity and authorization have been determined.

How do you create trust and where does this happen?

Imagine a network configuration that says, “I don’t trust any computer, user, or process until that computer, user, or process has provided credentials (for example, username and password or X.509 certificate) that has been validated (usually with some kind of second factor, an SMS text, authenticator push, or Certificate Authority) as authentic.” Only then does the network confirm that the computer, user, or process is authorized to do what they want to do. Yes, this includes traditionally “trusted” assets, like your own workstations!

The requirement to provide credentials and have them validated and then check for authorization is the basis for Zero Trust. The phrase that is often used is, “Trust nothing, verify everything.”

Because we can’t rely on the IP address of a machine to give us some measure of “identity” (in other words, “I trust this PC because it has our internal IP address”), the machines have to be validated. Typically this validation is with a certificate that is pushed out to the device from a centralized Certificate Authority. There are solutions that automate this process and can provide context before issuing a certificate to a device. Context in this case means, “Have I seen this PC before? Do I recognize the MAC address, serial number, or does it have an IP address I recognize?” The more context you have about a device, the more confidence you have that the device can be trusted. Keep in mind, the trust extended to that device is for that session only, or for a predetermined length of time.

Because we can’t rely on the user to provide just a username and password to prove that they are who they say they are, users have to be validated twice. Usually they identify with a username and password, then we confirm their identity a second time with some other method (an SMS or an authorization application like Duo, Microsoft Authenticator, or others).  This multi-factor authentication (MFA) helps provide a level of trust that the person is who they say they are. Just like with the device, the authentication of the users is for that session only and the user will have to re-authenticate once they disconnect or end the session.

As your security program matures you can also verify the software or applications that are running on your systems. Here you would most likely have lists of the applications that you trust and you have a hash value of the executables to make sure that the application has not been modified. This can be a bit complicated, but it is possible.

The main takeaway from this blog is that Zero Trust means—as the name implies—that you don’t trust anyone without some method (or methods) of authentication. For those of you thinking strategically, you might want to hold off on upgrading your VPN this budget year or next, and think instead of a Zero Trust solution for your remote work force.

Need more help with your cyber defense? Contact the CBTS cybersecurity team today.


More from CBTS Consulting CISO John Bruggeman:

What is Cyber Insurance and do I need it?

What do new TSA requirements mean for the security of your critical infrastructure?

How do you ensure the security of your supply chain?

Can you be ransomware-proof? Is that even possible?

Getting ransomware-proof, continued: CIS controls for medium-size organizations

Improve your cybersecurity defense with centralized logging

Improve your cybersecurity defense with centralized logging, continued: A deeper dive!

Improve your cybersecurity defense with centralized logging, continued: A deeper dive!

In my previous blog post I talked about the value of centralized logging, a high level, non-complex overview of how centralizing your logs can help you determine if your controls/defense tools are working.

Now I will go a bit deeper with some best practices regarding centralized logging and what other logs you can put in your centralized log server. Before I do, imagine this scenario:

11:00 p.m., Saturday night, over the Labor Day weekend (in the U.S.): Your helpdesk reports that the network is slow in New York City. That is odd, no one is working Saturday in the New York office.
 

What is going on?

You haven’t implemented centralized logging yet so you call the Operations Team (Ops) and notify them that something is going wrong in New York. You wait for Ops to get back to you. Thirty minutes pass, then you get a text back: 

Ops: Yes, there is a problem in NY, it is in the conference room, and someone or something is flooding the network with traffic. The entire network in New York is crawling at a snail’s pace.
 

Maybe some threat actor is working on a ransomware attack. Maybe someone has broken into the office in New York and is doing a denial of service attack. Maybe that new customer that asked for a demo on the Friday before Labor Day put a Raspberry Pi on the network in the conference room and is scanning the company network.

So, what is going on?

Man looking at computer. Centralized logging helps identify problems on your network.
Centralized logging helps identify potential problems on your network.

For you or your team to be able to answer this question quickly you need to know what is happening on your network. As you read this post you might start to think, “I can’t afford this John!” and you’re probably right. Information Security likely will not have the budget for centralized logging just for the sake of information security. But, once you have the logs in a central location they can be used for other business purposes. This is not a simple project, but then going to the moon wasn’t simple; nevertheless, it was accomplished. You need a good team and you need to stay focused to reap the big rewards. How, though, do you reap the big rewards?

First, you want to follow best practices, namely, plan ahead and think it through. Planning and thinking through this kind of project will pay off on several fronts, and not just for information security.

Here are some of the things to consider when you say to yourself, “I want centralized logging to improve my information security program.”

Read more: Software bill of materials (SBOMs): what is it good for?

Step 1. Create a plan and have a strategy for this project. Do NOT just buy the first centralized log tool you find. Plan for what you want to collect. As part of this planning process you’ll ask questions of your network team and others like:

  • How big are the daily logs from the web servers, SQL, Oracle DBs, etc.?
  • What is our network traffic load like (Gigabytes of network logs? Terabytes of network logs)?
  • How many devices do we want or need to monitor (servers, switches, firewalls, wireless APs)?
  • From what other systems do we want to collect logs (Anti-virus, home-grown applications, VoIP traffic, printer logs, your Kubernetes farm, etc.)?
  • What kind of shop are you running? All Microsoft? All Linux? A hybrid?
  • Besides security monitoring, why are you logging all this information? Application troubleshooting? Customer support? Continuous improvement?

Step 2. Make sure the structure of the logs you are collecting is consistent.

You won’t be able to ingest logs from multiple data sources unless there is a consistent log format. Your network infrastructure devices will have a format—most likely syslog format—and your firewall(s) will likely have a similar format, and then things can get proprietary (ugly, in other words). Remember, you are not just dumping data into an SQL server and then magically extracting useful information and meaningful insight into your network.

Step 3. A brief word about time and relativity and NTP.

This might be obvious, but to be clear, you need to make sure the logs all have the same time. All network devices and computer systems have a clock, so you will get the date and time for events that you are logging. You want to use Network Time Protocol (NTP) to sync all the systems to the same time source or you’ll have problems. Einstein proved that time is relative; for purposes of logging events in a central location for troubleshooting, you need the clocks on your devices set to the same time and time zone. If you have a switch (or two) that think it’s 1990, but you know it’s 2021, you are going to have a real tough time figuring out what happened that Saturday night of Labor Day weekend (note this is itself relative to Labor Day weekend in the U.S. and Canada because Labor Day is different in Australia, Japan, New Zealand, etc.).  Threat actors have calendars and know when people are likely to be away from their computers and monitoring systems, so plan accordingly.

Step 4. Make sure each data source has unique identifiers.

If you are searching through log data looking to see what happened Saturday night at 11:00 p.m. Eastern Time, make sure you know that the switch in the server room is uniquely identified compared to the switch in the conference room. Here is an example of a switch log record; note the various fields and values that you want to be able search and index.

Switch log record example from centralized logging.
Switch log record example.

You can see lots of good information in that record, but what switch did it come from? You need to be able to answer that question or all your time and effort has been for naught.

Step 5. Keep your production logs and centralized logs separate.

This is probably obvious but I need to state it plainly: The centralized log server does not replace your SQL logs (or Oracle logs or other production logs). When you need to roll back transactions in SQL or Oracle, etc., you are going to use those production logs. The value of the centralized log tool is gathering other insights. I’m thinking security insights (telemetry, correlation, etc.), but it could be troubleshooting a cranky application, dropped VoIP calls, or providing customer support.

Yeah! I’m done! Wait? I’m not?

Well, you’re more than halfway done. You’ve done the heavy lifting of getting your log data organized and centralized so that you can identify problems on your network when they happen. That is great.  Now you get to use this new tool to get insight into what is happening on your network.

Flash back to the start of this post and you can see how this tool can help you figure out what is happening.

11:00 p.m., Saturday night, over the Labor Day weekend: The helpdesk reports that the network is slow in New York City. That is odd, no one is working Saturday night in the New York office.
 

What is going on?

You tell the helpdesk to put in a ticket to Network Operations, and the Ops team opens up the centralized log server and does a query. Sure enough, there is a switch in the conference room that is blasting out a ton of bad packets. Looking a bit deeper, they see it’s an IoT device that has gone bad and is flooding the network with bad packets.

No other alerts have been triggered.

  • The firewall is not showing unusual activity out of New York, or anywhere else.
  • The database servers are humming along fine in the server room.
  • The only problem is this one switch in the conference room.
  • It’s not ransomware, and you’re not under attacked.
  • You don’t have to call the CEO or CFO about a possible ransomware.

The Ops team shuts off the port on the switch, traffic returns to normal, the event is logged in the ticketing system, and the New York network person has to replace the bad IoT device Tuesday morning.

Mystery solved, crisis averted, and you can chalk up that win to using the centralized log server to identify the offending switch. And as you continuously improve your cybersecurity posture throughout this year and into the next, it’s all the more reason add the centralized log server to your toolbox.

Need more help with your cyber defense? Contact the CBTS cybersecurity team today.


More blogs from CBTS Consulting CISO John Bruggeman:

What is Cyber Insurance and do I need it?

What do new TSA requirements mean for the security of your critical infrastructure?

How do you ensure the security of your supply chain?

Can you be ransomware-proof? Is that even possible?

Getting ransomware-proof, continued: CIS controls for medium-size organizations

Improve your cybersecurity defense with centralized logging

In my previous blog post I talked about the MITRE ATT&CK framework and how it helps you determine possible threats and threat actors’ techniques so that you can better focus your limited resources on the more likely threats.

The next question you might have is, “Am I being attacked?” and “Are my defenses working?” To answer that question you need to know what is happening on your network. To know what is happening you need to log activity on your network from a few sources.

Take your typical network that consists of a wired network (the PC connected to the switch) and some wireless laptops (connected to the wireless access point). The switch and the access point connect to a router and then to the firewall.

Network diagram consisting of wired PC and wireless laptop

If you want to know what is going on your network, you want to see the network activity (traffic) that is flowing on the wireless access point, the switch, the router, and the firewall.  To do that you have to log what devices and traffic are on your wireless network and wired network, as well the flow of traffic between the wired and wireless network, and the flow of traffic between the router and the firewall.

Typically you would have the access logs or system logs from each of these devices sent to a central collector, called (surprise!) the system log server, or syslog server. Your network would now look something like this:

Network diagram with syslog recording devices and traffic

Now that you are collecting this traffic information on a daily basis, you can then run searches (usually automated) that look at the log data and tell you if some odd or suspicious traffic is on your network.

You can search the syslog server for bad traffic coming from the internet to your firewall and confirm that the firewall is blocking the traffic. Or, you can confirm that you only allow certain kind of network traffic to leave your network to prevent private or sensitive data from leaving your network (think PII, HIPAA, intellectual property, CUI, etc.) via DropBox or Google Drive or Box. By checking the firewall logs you can tell that your data is not leaving your network through the firewall.

You can search the syslog server for unknown devices on the wireless or wired network. You would know which devices should be on the network, because you know what devices you own or have provisioned for your users to use. If a device shows up in the wireless log or the wired (switch) log you then know that you have to find out what that device is. How did it get there? Did someone bring in their own wireless access device so they can get a better signal in their office? Did they bring in a wireless printer so they can print in their office? By looking at the logs for those two networks you can determine that.

Your network team knows if traffic from the wired network should be allowed to flow to the wireless network, or flow the other way around. Maybe you allow that kind of traffic flow, maybe you don’t. Either way with a syslog server you can confirm that only allowed traffic is flowing on the wireless or wired networks by looking at the traffic logs from the router.

This is a simple example to help you visualize how collecting this network traffic allows you to see if the controls (access control lists [ACLs], firewall rules, network access control [NAC] rules, etc.) are working as you expect.

In my next blog post I’ll add in other data points (anti-virus software, Windows event logs, web server logs, etc.) to the syslog server to give you an even better picture of what is happening on your network.

Need help with your cyber defense? Contact the CBTS cybersecurity team today.


More from CBTS Consulting CISO John Bruggeman’s blogs:

What do new TSA requirements mean for the security of your critical infrastructure?

How do you ensure the security of your supply chain?

Can you be ransomware-proof? Is that even possible?

Getting ransomware-proof, continued: CIS controls for medium-size organizations

Improve your cybersecurity defenses with the MITRE ATT&CK framework

In my previous blog posts I’ve talked about the NIST CSF, and then I talked about another framework from the non-profit Center for Internet Security (CIS), which has a smaller set of controls to help companies and organizations secure their environment.

Learn how the ATT&CK framework can help you with your cyber defense.

I promised at the end of that post that I would talk about the MITRE ATT&CK framework. But first—because I am sure some of you asked—I’ll tackle the questions: who is MITRE and what does ATT&CK mean?

MITRE is a non-profit organization that manages federally funded research and development centers that develop tools and research issues for various U.S. agencies, like aviation, healthcare, DHS, and others. ATT&CK is a framework that helps cybersecurity teams—both red and blue—figure out how threat actors gain access to computers and systems and what they do when they gain access.

ATT&CK stands for Adversarial Tactics, Techniques & Common Knowledge.

Think of it as a playbook that an adversary uses to break into your mobile phone, tablet, computer, or computer system. The ATT&CK framework is like having your opponent’s playbook in a football game. Every organization has limited resources and knowing where to focus your attention helps you utilize your resources most effectively.  The framework is free and was first published in 2015, so it is well known in cybersecurity circles.

Here is an example of how to use it:

Imagine you are a nonprofit that supports human rights and because of what you do, you will be targeted by certain threat actors. As a non-profit, you have few resources to devote to cybersecurity, so you search ATT&CK for malicious actors who target organizations like yours and see what techniques they tend to use. The ATT&CK index identifies malicious actors and who they tend to attack. In your search of the ATT&CK site you see that APT18 (targets human rights groups and tends to focus on External Remote Services, like a VPN or a Citrix server rather than phishing emails to gain access to computer systems.  

As you review one of the techniques APT18 uses, you find Technique T1133 and read the ways to mitigate that threat.).

You can now focus your limited resources on mitigation techniques for remote services to help block that threat actor.

If you look at APT18, you’ll see that they tend to use eleven techniques to gain access and ATT&CK has those techniques identified and how to mitigate those threats. The framework is useful for beginner, intermediate, and advance security teams because it has the technical depth to grow and mature your security posture.

If you are just starting your cybersecurity journey you will quickly discover that you need to log what is happening on your network and on your computers and systems in order to know what to look for and where. Are you looking for malicious network traffic or unusual activity on your mobile devices and Windows and Mac computers? Are you checking your firewall logs, your antivirus logs, and your system event logs for suspicious activity? If you are not logging that information in a central server you will have a hard time finding the threats to or on your network.

I’ll talk about getting all those log files together so you can go searching in my next blog post.

Need help with your cyber defense? Contact the CBTS cybersecurity team today.


Read more from CBTS Consulting CISO John Bruggeman:

What do new TSA requirements mean for the security of your critical infrastructure?

How do you ensure the security of your supply chain?

Getting ransomware-proof, continued: CIS controls for medium-size organizations

In my previous post on the question of being ransomware-proof, I talked about the NIST Cybersecurity Framework (CSF). Some of you, I am sure, Googled “NIST CSF” and found tons of information from NIST on the framework. Then as you looked at the details, you might have been intimidated by the five functions (Identify, Protect, Detect, Respond, and Recover) and the 23 categories, and 108 subcategories. It might have sounded too complicated, too much to bite off, and you might have even wondered, “Where do I start??”

First, that feeling is totally understandable. The NIST CSF is a comprehensive framework. It works well for regulated companies, like banks, utilities, hospitals, etc., organizations that have regulatory compliance that needs to be addressed, that have to protect their customer’s data, and that also have to prove that they have protected that data.

Recall that at the end of that post, I said I would talk about CIS Controls as another framework you can use.

For medium-size companies that may or may not be regulated, or do not have to adhere to a compliance standard, the Center for Internet Security (CIS) Controls might be a better solution. CIS has a set of controls that can be downloaded for free and can be more easily applied to manufacturing, service organizations, retail, schools, and other verticals that are not tightly regulated.

CIS Controls version 8 has 18 categories with safeguards inside each category that map to a particular asset type (like a computer, a software application, company data, or corporate network). The safeguards do a particular function (like Identify, Protect, Detect, Respond, and Recover) for that asset type. Finally, each of these safeguards are tied to an implementation level of 1, 2, or 3, which will vary based on how far along a company is with its security program. Level 1 is if you are just getting started, Level 2 is more advanced, and Level 3 is the most advanced.

You’ll notice that the CIS controls map to the same general categories as the CSF; that’s done intentionally to help companies or organizations understand how they compare with their peers, communicate with auditors, board management, and risk committees.

The CIS Controls are written in easy-to-read language with clear functions and safeguards that are plainly identified and can be implemented at Level 1 with no cost or low cost tools.

Often the topic of cyber security is compared to eating an elephant—daunting and unapproachable—but when you look at the CIS controls you can see how the process is laid out in an understandable way that allows you to start your journey toward a safer and more secure environment.

In my next blog I’ll round out my Framework discussion with MITRE ATT&CK.

If you need guidance to implement or upgrade your cybersecurity program, contact the security team at CBTS. We can help your organization get ransomware-proof and stay that way.


Read more from CBTS Consulting CISO John Bruggeman:

How do you ensure the security of your supply chain?

What do new TSA requirements mean for the security of your critical infrastructure?

What do new TSA requirements mean for the security of your critical infrastructure?

The Transportation Security Administration (TSA) announcement in May regarding new requirements for owners and operators of gas pipeline operators is an indication that the federal government is not going to take a light approach regarding cybersecurity. Rather than making recommendations they are issuing requirements.

The change follows the attack on Colonial Pipeline in mid-May that crippled nearly half of the fuel supply for the east coast. There have been previous attacks on other critical infrastructure in other countries like Saudi Arabia in 2018 and several attacks on critical infrastructure in the Ukraine, most recently in December 2016 when power was cut in parts of Kiev.

Clearly the risks to critical infrastructure have never been higher and the federal government is moving forward with new rules for all critical infrastructure as noted in this recent fact sheet.

So what should you do?

Plan to follow the rules just released by the TSA for gas companies because they will likely soon be applied to your industry:

  1. Appoint and identify, within seven days, a cyber coordinator (and a backup cyber coordinator) who is available to the Cybersecurity and Infrastructure Security Agency (CISA, part of the Department of Homeland Security) officials 24×7.
  2. Report all cyber intrusions to CISA within twelve hours of the incident.
  3. Develop and implement a contingency and recovery plan for cyber intrusions.
  4. Compare the plan with DHS standards, identify gaps, develop measures to fill them, and gain approval for them from the CISA.

Use a cybersecurity framework to provide a roadmap for fixing the problems or gaps that you discover from step 4. Using a framework will help you and your team prioritize and address the biggest risks first.

You should also consider joining the appropriate information sharing and analysis center (ISAC) for your industry. There is one for electricity called E-ISAC, plus others for industries like healthcare, financial services, communications, aviation, and chemicals. You can find more about them here at the national ISAC organization. If you need more help, contact the CBTS Security practice.


Read more from John Bruggeman:

Can you be ransomware-proof? Is that even possible?

How do you ensure the security of your supply chain?