Time based Security - Relevance

One of the fundamental principles of security is to understand the criticality of the asset to be safeguarded, its threat environment, and the risk appetite of the enterprise. Based on which security strategy to protect and defend to be planned, this approach is the same for both physical and cybersecurity.

The traditional fortress was built with multiple security controls like internal/external high walls, moats, guards, watchtowers based on the criticality of the asset protected and the threat environment. Assumption while designing each of this control was not that none of these controls will ever be breached, but layers were built to provide resistance and delay the adversarial advances, so the handlers could respond and bring in required defensive and offensive capacity when needed.

The architectural concept of layered security or defense in depth is adoption from the traditional fortress model. In each of the layers starting from the perimeter, both detection and prevention control enforced. One of the key considerations in this security architecture program design is Time based security approach, it is the time required to get an indicator of an attack – time to analyze – time to respond – time to mitigate – time to normalcy.

As an example, consider 2 scenarios, with the assumption

  • An enterprise security team works only 1 shift from 8 AM to 5 PM
  • All logs available and correlated and excellent security team engaged

Scenario – 1

  • PT team announces a PT activity on enterprise AD at 3 PM, triggered from a specific disclosed IP address
  • So, in the best-case scenario, the internal security team detects this attack events on AD by around 3.xx PM, respond to the activity in the next few minutes and incident closed by 3.30 PM (approximately)

Scenario – 2

  • Unannounced intrusion activity by Red team against a critical server at 5.15 PM 
  • So, the best-case scenario, since security shifts end at 5 PM and resume only at 8 AM next morning, these events will be detected only by around 8.30 AM and incident closed by about 9 AM or later based on maturity.

Considering the above scenarios, the time-based capability of the enterprise to detect and respond to an attack is potentially between 30 Minutes to 15 hours (during holidays and weekends lag could be in days). A lag of 15 hours to detect the event may not be accepted as per enterprise risk appetite

To improve enterprise response capability (based on risk appetite), options are to extend the security shift hours, or/and enforce stringent security controls and practices to avoid such attacks. 

It is important to periodically measure these capabilities to be relevant, complied, effective and resilient, Time based security is relevant and critical in this

The formula for Time based security is

P(t) > D(t) + R(t)

  • P = time the adversary takes to break controls. 
  • D = Time required to detect the attack
  • R = Time to respond to and mitigate the attack.

Like defender, the attacker also uses a time-based security approach from the planning stage. An example in the physical world, the robber may be calculating the time available from the point alarm triggers or the events generated to the time defender or law enforcement reaches the site or responds. It the time between those 2 events is the time available for the attacker to execute the plan.

Attackers have improved their time considerably over the years leveraging automation, big data, social engineering techniques, zero-day exploits, collaboration with similar groups etc. Defenders need to improve their time to detect and respond, to stay relevant and effective.

The time required to detect the attack ‘D’

Time and capability to detect an (any) attack is a very critical factor, ideally need to start with the data sources and event of interest getting collected and correlated to understand the potential strike, coverage of control enforcement, skill set availability, and process in place to respond. 

Many of the security controls enforced may be only a detection mechanism and not fully configured to be preventive. An example is of, IPS which may not have all signatures in block mode, it may be set only to alert. The expectation is that the responder will see this alert in a reasonable time, knows how to respond and whom to escalate if required.

Time to respond to and mitigate attack ‘R’

Based on maturity and priority defined in the enterprise security program, feasibility, and capability to respond to varied scenarios of attack to be evaluated periodically. Ideally, it should be reviewed against each of the potential attack use cases based on the kill chain model.

A SWOT analysis helps to understand the strength and weaknesses of attackers and defenders in each of the use cases. There are phases were attackers need too long period to complete the attack lifecycle, an example is data extrusion attempts or on lateral movements.

If time to detection and to respond is long, may have to enforce defense protection by default, an example is on unauthorized access, AD configuration is, post 3 or 5 failed login attempt, rule configured to lockout at AD account till manual intervention is available or for a specific period of time.

Response maturity also depends on the authority responder has on each of the use-cases, defined process, escalation support, RACI model etc

Maturity and capability to be measured on the final outcome to achieve the objective to contain the incident and return to normalcy without damage, and not on the type or extent of control in place. Just adding controls without having an effective process and skillset to validate and respond is useless. 

In the formula P(t) > D(t) + R(t), potential exposures, vulnerabilities, skill gaps, blind spots, misconfigurations should be discounted while measuring maturity and capability.

Also, to review the potential impact of the incident based on the delayed response to be considered for prioritizing the model.

 Considerations on attacks triggered with social engineering, zero-day, insider errors/omissions/oversights to be taken while defining use-cases

Time-based security should be a key consideration in all stages of security architecture and operation model. 

Let us work together to have secured trustworthy cyberspace.

Acknowledge the thought leadership of Winn Schwartau, Richard Bejtlich and others in this domain

True test of CyberSecurity architecture would be Time and value !! Well explained Sunil

Haritha Sarma Nimishakavi

Vice President @ HCLTech | Software Project Management

5 年

Good one .. Very informative.

Good. Informative Article. Thanks

Interesting thoughts....Thanks for well conceptualized article !

Rajeev Panicker

Business Leader | Cyber & Privacy Evangelist | Mentor | Cybersecurity & Privacy Strategist | AI Assurance | Digital Transformation | OT & Automotive Security Consultant | Automotive Functional Safety Expert

5 年

Nice article

要查看或添加评论,请登录

Sunil Varkey的更多文章

  • Building an Application Security Program - A high level approach

    Building an Application Security Program - A high level approach

    The majority of the security incident category in recent time is related to exploits of vulnerabilities or…

    18 条评论
  • Fishing in Muddy Water

    Fishing in Muddy Water

    Most of the enterprise networks are too noisy, with huge volume of bad traffics getting denied at host of systems…

    4 条评论
  • 2021 Security Predictions

    2021 Security Predictions

    Security events triggered by Solarwinds episode and others, will trigger revalidation of security strategy, mainly on…

    21 条评论
  • Elephants, Tigers and Snakes

    Elephants, Tigers and Snakes

    Many incident handlers and analysts defend cyber-attacks with a 'One size fits all' standard response, which most of…

    2 条评论
  • 2020 Cyber Security – Strategy Considerations

    2020 Cyber Security – Strategy Considerations

    With the new financial year, Cybersecurity strategy and budget discussions are now in the finalising stage at…

    3 条评论
  • Blueprint, your Digital Estate

    Blueprint, your Digital Estate

    For any digital environment to sustain and to be defensible, there are few principles, hygiene, DNA it needs to…

    1 条评论
  • Persona based Adaptive security

    Persona based Adaptive security

    In the interconnected cyber world, access and privileges to sensitive information and critical infrastructure…

    3 条评论
  • Cyber Crisis Communication – A Key factor in Incident Response

    Cyber Crisis Communication – A Key factor in Incident Response

    With incident and crisis becoming a routine activity in the Cyberworld, communications with stakeholders during various…

    5 条评论
  • Leverage Digital Forensic resources effectively

    Leverage Digital Forensic resources effectively

    With many universities offering master's in digital forensics study and with other training, the supply of forensics…

    7 条评论
  • Scale-up response strategy, credentials in the Dark web

    Scale-up response strategy, credentials in the Dark web

    Recent reports of large-scale credential exposure in the Dark web is alarming and warrants a scaled response strategy…

    3 条评论

社区洞察

其他会员也浏览了