2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon...

26
1 2012 雲端資安報告 1 黃建榮 資深顧問 - Verizon Taiwan August 2012

Transcript of 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon...

Page 1: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

1

2012 雲端資安報告

1

黃建榮 資深顧問 - Verizon Taiwan

August 2012

Page 2: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

2

It’s All About Security Protecting assets from threats that could impact

the business

Protecting Assets . . .

• Stationary data

• Data in transit

• Software

• Hardware

• Physical infrastructure

… From Threat Agents . . .

• External - outside the organization

• Partner – a business relationship

• Internal – employees

…Taking Threat Actions . . .

• Hacking

• Malware

• Physical attacks

• Misuse

• Social tactics

… To Prevent Harm to the Business

• Exposure of intellectual property

• Exposure of employees’ and/or customers’ personal/private information

• Exposure of private business transactions

• Business slow-down or interruption from damage to hardware or software

• Fines or other actions by agencies that regulate the business

• Harm to the brand reputation

Page 3: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

3

Hold on… Wha??? Why is telecom company investigating

breaches?

Page 4: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

4

Enterprise Solutions to Meet

Business Imperatives

IT Services Security Services Communications

Services

Networking

Services Mobility

• Cloud-based Services

• Data Center Services

• Managed Applications

• Managed IT

• Equipment and

Services

• Professional Services

• Government, Risk and

Compliance

• Identity and Access

Management

• Managed Security

• Equipment and

Services

• ICSA Labs

• Professional Services

• Contact Center

Services

• Unified

Communications

• Video, Web and Audio

Conferencing

• Traditional Voice

• Emergency

Communications

Services

• Equipment and

Services

• Professional Services

• Internet

• Private WAN

• Private Point to Point

• Access Services

• Managed Networks

• Equipment and

Services

• Professional Services

• Advanced

Communications

• Applications and

Content

• Global

Communications

• Hardware

• Mobile Data

• Voice and Messaging

• Professional Services

RISK Team

falls here

Page 5: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

5

What is the Data Breach Investigations

Report? (DBIR)

• Verizon’s Data Breach Investigations Report (DBIR) is an ongoing, unbiased study into the world of cybercrime.

– Analyzes forensic evidence of data breaches

– Uncovers how sensitive data is stolen from organizations, who’s doing it, why they’re doing it, and, what might be done to prevent it.

Page 6: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

6

Why We Do It

• Studying security breaches helps Verizon and the Customer understand how they occur.

• Real science – measures what happened across thousands of instances, and converts that data into better decisions, more effective security.

• The better we understand them, the better we can prepare for and prevent them.

Page 7: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

7

When there’s a Breach call the

Investigative Response (IR) Team!

• The Investigative Response Team:

– Experience & Expertise

– Detect / Prevent / Respond

– 24 x 7 hotline / Onsite support within 24 hours

– Digital forensics / investigation

– Computer incident response

– Fraud analytics

– Electronic data recovery

– Electronic crimes counter-surveillance

– Protocols for containment

– Transition of evidence to law enforcement for prosecution

• The expansive data set generated through these activities offers an interesting glimpse into the trends surrounding computer crime and data compromise, which is detailed in the Data Breach Investigation Reports.

Page 8: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

8

2012 Data Breach Investigations Report

Page 9: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

9

2012 Data Breach Investigations

Report – Global Study

澳洲聯邦警察 荷蘭高科技罪案組 愛爾蘭報告與資訊安全服務

英國警察中央電子犯罪部門

美國秘勤局

Page 10: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

10

Data Collection and Analysis

Methodology - VERIS

Data Sample

• 855 data breaches

• 174 million stolen records in combined

dataset

Collection and Analysis

• VERIS (Verizon Enterprise Risk and Incident Sharing)

framework used to collect data after investigation

• VERIS provides a common language for describing

security incidents (or threats) in a structured and

repeatable manner

• Case data anonymized and aggregated

• RISK Intelligence team provides analytics

VERIS: https://verisframework.wiki.zoho.com/

Page 11: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

11 11

The Threat Environment 2012 DBIR Key Findings: Threat Agents

Threat Agents are the source of a breach

98% of all data breaches stemmed from external agents (+6%)

4% implicated internal employees (-13%)

<1% committed by business partners

58% of all data theft tied to activist groups

Page 12: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

12

External Threat Agents on the rise…

Page 13: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

13 13

The Threat Environment 2012 DBIR Key Findings: Threat Actions

• 81% utilized some form of hacking (+31%)

• 69% incorporated malware (+20%)

• 10% involved physical attacks (-19%)

• 7% employed social tactics (-4%)

• 5% resulted from privilege misuse (-12%)

Threat Actions are what Threat Agents did to gain access a protected system or device

Page 14: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

14

Top Ten Threat Actions for Larger

Organizations

Page 15: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

15

Compromised Assets

Page 16: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

16

Most Compromised Assets

Page 17: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

17

Compromised Data

Page 18: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

18

The 3-Day Workweek

Page 19: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

19

Time Span of Events

Page 20: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

20

Breach Discovery

Page 21: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

21 21

The Threat Environment 2012 DBIR Key Findings: Commonalities

• 79% of victims were targets of opportunity (-4%)

• 96% of attacks were not highly difficult (+4%)

• 94% of all data compromised involved servers (+18%)

• 85% of breaches took weeks or more to discover (+6%)

• 92% of incidents were discovered by a third party (+6%)

• 97% of breaches were avoidable through simple or intermediate controls (+1%)

• 96% of victims subject to PCI DSS had NOT achieved compliance (+7%)

Page 22: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

22

Recommendations: Smaller Orgs

Page 23: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

23

Recommendations: Larger Orgs

Page 24: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

24

Verizon Enterprise Security Solutions

Can Help

Page 25: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

29

• Manage millions of identities for governments of 25+ countries Identity Mgmt

• Delivered 1000+ vulnerability mgmt engagements in 2010 and 2011 Application Security

• Delivered 1000+ GRC engagements in 2010 and 2011 Assurance

• More PCI QSAs than any other firm in the world Compliance

• 7 SOCs track & manage >5 Billion security events & alarms monthly Log Mgmt

• Scanned >100 Million files; discovered >1 Billion sensitive data elements Data Discovery

• Led one of the world’s largest DLP deployments (400,000+ seats ) Data Protection

• Manage security of 250,000+ mobile devices Mobility Security

• Largest & highest rated MSSP in the world (Gartner, Forrester, etc) Threat Mgmt (MSS)

• Delivered 1000+ vulnerability mgmt engagements in 2010 and 2011 Vulnerability Mgmt

• Analyzed 2000+ data breaches involving 1 Billion records Breach Prevention

The Verizon Advantage We are serious about security…

Page 26: 2012 雲端資安報告 - Trend Micro1 2012 雲端資安報告 黃建榮 資深顧問 - Verizon Taiwan August 2012

30

Thank you!