Tim MalcomVetter, Author at NetSPI The Proactive Security Solution Wed, 22 May 2024 18:39:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://www.netspi.com/wp-content/uploads/2024/03/favicon.png Tim MalcomVetter, Author at NetSPI 32 32 Proactive Security 101: Discover, Prioritize, Remediate  https://www.netspi.com/blog/executive-blog/proactive-security/proactive-security-101-discover-prioritize-remediate/ Wed, 22 May 2024 18:30:23 +0000 https://www.netspi.com/blog/general/uncategorized// What is proactive security? And what are the tangible steps you can take to implement proactive security measures? NetSPI is here to be your guide.

The post Proactive Security 101: Discover, Prioritize, Remediate  appeared first on NetSPI.

]]>
Forrester analyst Erik Nost predicted that proactive security would steal the show at RSA this year — and the prediction was right. While proactive security isn’t new in cybersecurity, it’s gaining traction as a concrete approach to shifting the mindset of security teams from reactively patching known vulnerabilities toward seeking out the unknown, prioritizing the most important efforts, and confirming remediation on an ongoing basis. Who wants to be seen as slow and reactive when you can be proactive and ready? 

Simultaneously, more and more vendors are latching on to the term to define a broad spectrum of solutions. Before it becomes a security industry buzzword, let’s take a critical look at what proactive security is, its core pillars and use cases, and how to get started building a proactive security strategy.

What is Proactive Security? 

Let’s level set with a shared definition. Forrester defines proactive security as:  

“A strategic approach to controlling security posture and reducing breaches through strong visibility, prioritization, and remediation.” 

Proactive security improves overall defense by flipping the script on legacy security strategies and equipping teams with specific measures to take at each phase. Aligning with how our customers and the analyst community is approaching this space, here’s how we define the three core pillars of proactive security at NetSPI:  

  • Discover
    This entails a thorough understanding of the assets and vulnerabilities within a company’s infrastructure. The discovery phase extends visibility to shadow IT and previously unknown company and third-party assets for a comprehensive scope of owned assets. This also includes discovery of issues that aren’t necessarily defined as “vulnerabilities,” including the discovery in detection gaps and response capabilities. 
  • Prioritize
    This phase involves distilling these discoveries into actionable objectives. It requires leveraging tools that facilitate the assessment and validation of threats, weaknesses, and controls to aid in decision-making for where to invest time and resources. Determining what to remediate next is an ongoing challenge, as the task is never complete. To do this, teams can consider the likelihood of threats impacting assets along potential attack paths and prioritize vulnerabilities accordingly. By assessing the broader risk landscape and understanding which risks truly impact a business, teams can effectively prioritize their effort to secure what matters most.  
  • Remediate
    Prioritization is key to effective remediation because vulnerability and posture management activities are never-ending; focus is critical. Proactive security programs will put clear remediation guidance in the proper engineering hands to aid and speed them up, followed by a validation assessment process to ensure the remediation actually works. 

These three pillars are not one-size-fits-all. Rather, security teams can start by evaluating their current position against each one of the pillars, and then break down their proactive security journey into manageable milestones.

Why Now? Challenges Driving Proactive Security Forward

The focus of many security programs today is still reactive, from the latest vulnerability in the news to inbound alerts in your detection stack — something happens and then security teams react. Putting proactive security into your organization means dedicating teams to support and focus on posture management, patch and vulnerability management, detection controls assessments and tuning, and red teaming. When executed correctly, each of these helps you get ahead of the problems, rather than respond to them. 

Expanding Attack Surface 

The attack surface is expanding at a rate we’ve never seen before. The constant addition of new assets makes ongoing asset identification difficult at best. Sixty-seven percent of organizations have seen their attack surfaces expand in the last two years1. This has resulted in more vulnerabilities created at an increasing rate. Plus 69% of organizations have had an attack that started through the exploit of an unknown, unmanaged, or poorly managed internet-facing asset, making this challenge an urgent one to address2.

Identifying the Unknown 

IT and cybersecurity teams must fully understand their assets in order to protect them. After all, how can you protect the unknown? Identifying those assets, who’s using them, and who’s responsible for vulnerability remediation is a constant challenge. This is especially true because IT often doesn’t have visibility into assets created by employees, aka shadow IT. In fact, by 2027, 75% of employees will acquire, modify, or create technology outside of IT’s visibility3.

Fine Tuning Security Controls 

Security teams are buying more and more tools, yet NetSPI has found that up to 80% of common attack behaviors are missed by EDR, SIEM and MSSP out of the box solutions. This is in part because of the cybersecurity skills shortage, resulting in teams not having enough time to tune or manage their security stack to meet its full potential.

Reducing Noise and False Positives 

Even when risks are identified, there is often not enough time to investigate and there are too many false alarms. Security staff spend an average of 30 minutes for each actionable alert, and 32 minutes for each false positive4. This means teams are spending more time chasing false positives instead of the activities that pose a real risk. The cybersecurity industry needs a holistic way of tackling these challenges, positioning proactive security at center stage in this ongoing feat.

4 Questions to Get Started with Proactive Security 

Whether you’re starting your proactive security approach or looking to enhance current workflows, these foundational questions will uncover specific steps that can help. 

  1. What assets do I have?
    Visibility is the first challenge companies are trying to solve for. This entails finding and creating an inventory for all assets — particularly externally facing ones, aka connected to the internet. However, the objective goes beyond finding all the assets, extending into understanding their context and any exposures. For example, who in the organization uses the asset? Is it something that should be decommissioned or still be active? And who is responsible for remediating the asset if it has an identified risk? 
  2. How do I continuously monitor my assets and prioritize what I need to fix?
    Once security teams have identified all assets and understand the context and risk, then how do they continuously monitor these assets, as well as identify new ones that come online? This is the second challenge the industry is trying to solve for using proactive security. Then, how do they prioritize what to remediate? No list of remediations is ever completely done. So, how do teams understand where to focus?
    They need to think about which threats are likely to impact the assets within an attack path and which vulnerabilities will likely be exploited. Typically, teams do this in a reactive, instead of proactive, way. They prioritize “critical” vulnerabilities first without  understanding their environment, what risks truly impact their business, and most of the time without knowing if attackers are actually exploiting that particular type of vulnerability. They also should assess the strength of their security controls and their efficacy when making these considerations.
  3. How do I validate my security controls?
    This challenge is particularly difficult because many companies do not prioritize putting the strength and efficacy of their security controls to the test, despite that being the hallmark of proactive security. Many realize this is important, yet companies spend more and more of their IT budget to acquire more security tools without maximizing what they currently have. Since these tools are shipped out of the box with a “one-size-fits-all” or a “least intrusive default” configuration despite the fact that every organization is different, this leaves the security team responsible to ensure these controls are tuned to match the risks that matter most to their company.
    Most security teams do not have enough time or resources to perform the control validation, however, let alone the work required to keep pace with the latest attack trends, understand where the greatest gaps in their security defense reside, maintain alignment with the MITRE ATT@CK framework, and enhance their controls accordingly.
  4. How do I ensure my team can respond?
    The last challenge companies are trying to solve by using proactive security is to ensure their team can effectively respond to potential threats. It’s important for companies not only to put their security stack to the test, but also to ensure their team’s readiness. Prevention controls will fail. Proactive security means testing your team’s ability to respond when they do. Internal response teams are often pulled in several directions, handling the mundane background noise, and rarely responding to a major incident involving a highly skilled and motivated adversary with a foothold inside the organization. Keeping their perishable response skills sharp is paramount to staying proactive. 

Footnotes

  1. https://securityintelligence.com/news/new-report-names-attack-surface-management-leaders/ ↩
  2. ESG Research: CSO Online Article Look for Attack Surface Management to Go Mainstream in 2023 ↩
  3.  Gartner Unveils Top Eight Cybersecurity Predictions for 2023-2024  ↩
  4. ‘Alert Fatigue’ Can Lead To Missed Cyber Threats And Staff Retention/Recruitment Issues: Study ↩

The post Proactive Security 101: Discover, Prioritize, Remediate  appeared first on NetSPI.

]]>
What is the CISO Experience in a Red Team Exercise? https://www.netspi.com/blog/executive-blog/red-teaming/ciso-experience-in-red-team-exercise/ Tue, 16 Jan 2024 15:00:00 +0000 https://www.netspi.com/ciso-experience-in-red-team-exercise/ What can you expect while going through a Red Team exercise? We answer the questions on every CISO’s mind when considering a Red Team engagement.

The post What is the CISO Experience in a Red Team Exercise? appeared first on NetSPI.

]]>
You’re about to have your first Red Team experience, or maybe your first one in the CISO seat of your organization. Maybe it’s just been a little while since your last one and you are curious how this one will go, what the Red Team will find, how your Blue Team will handle it, and what the longer tail takeaways post-engagement will be like.  

But before you begin, it’s important to consider: What am I not thinking about? Are we ready? How can I prepare for this?

What if I Have Specific Objectives for Red Teaming?

If you haven’t already, make sure you’ve discussed your objectives with your Red Team partners to ensure alignment with what you’re hoping to learn and focus on. This conversation will often center around matching Red Team objectives with the maturity of the security program and your Blue Team to get the most benefit from a Red Team exercise, because this definitely should not be a one-size-fits-all exercise. For example, at NetSPI, we tailor match the Tactics, Techniques, and Procedures (TTPs) we use to your currently known capabilities and gaps. Our goal is to help you grow your program in a meaningful and material way, even if resources are constrained and growth is gradual.

How Much Do I Tell My Team when Engaging Red Team Testing?

It’s most common for a Red Team exercise to be an extremely limited knowledge event. Who you provide advanced notice to is up to you. Our advice: less is more if you want to know how truly prepared your security program is.  

If you do these all the time, you may want to tell your team that a Red Team exercise will happen in the future but remain vague—no specific dates. This has a “Secret Shopper” effect, just like a retail clerk who is unsure if their customer is an actual customer, or a plant sent from corporate headquarters to evaluate the store. The foreknowledge that a secret shopper may arrive at any time can have a positive psychological effect, bringing out the best performance of the team. Likewise, your Blue Team may become naturally more vigilant simply because they know a Red Team may come anytime.

What if I have an MSSP or MDR Provider?

Since most MSSP or MDR provider relationships are focused solely on the ability to detect and respond to credible threats, it is best to NOT advise them in advance that the Red Team exercise is happening. However, post-exercise, it is critical that you properly read-in your provider so that they can collaborate with you on a path to improve detection and response coverage. NetSPI, specifically, loves to partner with MSSPs and MDR Providers, because they are your Blue Team on the front lines. Our objective isn’t to make your provider look bad; our objective is to prepare your organization for the eventuality of a real incident.

Should I Have Expectations on How Successful the Red Team Exercise Will Be? 

It’s probably best to set expectations that while your Blue Team will bring some friction to the Red Team, it will feel like the Red Team managed to get ahead and reach objectives too easily. This isn’t always the case, of course, and we love to have our best tradecraft get shut down by our customers!  

But since our Red Team constantly focuses on what works, what doesn’t, what security controls provide friction against which TTPs, etc., we are constantly improving. If our Red Team is successful, it doesn’t mean that the threat actors most likely to land in your environment will automatically have equal success.  

Threat groups tend to cluster around a smaller set of TTPs than our Red Team because they apply them at Internet scale across many organizations. If the techniques fail and a Blue Team contains them, they don’t care. There isn’t enough friction to change TTPs often if they still work on the next victim. Our goal is to be the best [simulated] threat actor we can be for you. This is a subtle, but important difference. 

Now all of that isn’t to say this is easy for our Red Team. By far the hardest part of our job is getting the initial access foothold into your organization. We don’t have magic 0-day exploits to walk right in. We have drudgery ahead of us: scouring your entire perimeter, learning about your business using Open-Source Intelligence (OSINT), social engineering our way in (if that’s in scope for your engagement) … essentially leaving no stone unturned.  

We prefer to do it this way, when possible, because once our Red Team lands inside your organization, it will “feel natural” to incident responders who eventually (hopefully) will see something unusual that they chase to its origin. But that said: do not over-index on this step. If your goal is to absolutely find a way from the outside into your organization, you probably should do an External Network Penetration Test instead.  

What you’re ultimately buying in a Red Team exercise is the detection and response cat-and-mouse game that helps you evaluate your readiness for a breach. You don’t get that benefit from us until we land inside your organization. Because neither you nor we have unlimited surplus budget, we will want to time box our efforts looking for the “natural” ingress point, and when we hit that point, we will want to switch to an “assumed breach” scenario where you seed us access. We can even do it this way from the start to save time and money.

What Happens After a Red Team Exercise? 

Besides the debrief meeting and handing you deliverables, what’s next for a CISO after a Red Team exercise? In most cases, there will be significant security engineering and process overhaul project work. Unlike a pentest, where a finding can be quite small and tactical, such as applying a patch, fixing permissions, changing a password, or updating a line of code, findings coming out of Red Team exercises are typically wide-reaching and systemic. Some may require projects that span more than a year to complete. It may be good for you to brief your CFO, CEO, and Board of Directors about the exercise in advance that you will likely come asking for a budget increase to cover control gaps. We can certainly help you with messaging there as well! Reach out anytime. 

What about Follow-Up Testing? 

While the Red Team may likely find and exploit vulnerabilities in your internal environment, they won’t exhaustively search for all related instances of that vulnerability. Red Teaming is a depth-first search: chaining vulnerabilities, detection gaps, process flaws, and misplaced human trust together to reach an objective.  

Penetration Testing, on the other hand, is a breadth-first search: locating all instances and permutations of all possible vulnerabilities. For example, if the Red Team finds a single instance of SQL injection on an internal web application, exploiting that to gain additional objectives or access, the best next step is to perform a top-to-bottom penetration test on that web application, to ensure nothing else was missed that the Red Team didn’t have time to find, or was trying to be too quiet to test. 

How Often Should I Plan for Red Team Testing?  

This is entirely up to you, of course, but here are some things for you to consider:  

  • How much has changed with your controls since you completed the first Red Team exercise?
    If not much, don’t expect a wildly different experience in the Red Team’s ability to reach objectives—but the exercise can still be meaningful to give your Blue Team another chance to train and become more prepared for an actual event. You can also ask us to avoid certain things or modify the path towards objectives to vary from your prior experience. 
  • How large and segmented is your business?
    If you have a lot of M&A, subsidiaries, disparate geographic locations, etc., you may benefit from intentionally scoping another Red Team exercise to land in another part of your organization sooner than later. These “satellite” organizations often provide less detection and response friction to adversaries looking for a path to pivot into the corporate mothership.
  • What cadence are you trying to establish?
    It may be beneficial from a budgeting perspective to plan for a semi-annual or annual Red Team exercise to set a solid precedent with your CFO, CEO, and Board of Directors that this is a meaningful recurring part of your security program. When combined with the ideas above, the experiences each time will definitely vary. 

How Can I Tell if a Red Team Exercise is Successful? 

As the CISO, you will appreciate that a successful Red Team exercise has almost nothing to do with whether the Red Team reached an objective.  

The Red Team could reach an objective but highlight serious gaps in the process that you can quickly fix with existing controls or help make the business case for a security budget extension. Or they could be contained by your Blue Team without any new technical learnings, yet the confidence the Blue Team gains from containing the Red Team might be precisely what is needed for your security program. 

At the end of the day, “success” is largely a product of clearly defining the goals you have for the engagement and tying the results back to the identification and reduction of risk, improving your cybersecurity program, and protecting your organization. No two exercises are exactly alike! 

Whether you’re starting your first Red Team exercise, or you’re looking for an outside perspective on your overall security, NetSPI is here to help. Access our Red Team data sheet below to get started.

The post What is the CISO Experience in a Red Team Exercise? appeared first on NetSPI.

]]>