Thursday, October 29, 2015

Continuous Asset Profiling

Continuous Asset Profiling 

Something we are pretty proud of at edgescan is our Continuous Asset Profiling service which is part of any edgescan license.
We call it HIDE (Host Index, Discovery & Enumeration).

So what is it and why should I care?

HIDE provides continuous asset profiling across blocks of our clients IP's
So rather than asking a client to specify individual IP's, edgescan profiles entire IP blocks/ranges. But why do this?
The reason we give our clients the ability to profile entire blocks is three-fold.

  1. HIDE can detect if a server/IP goes live since the last round of continuous profiling.
  2. HIDE can detect if a new service / port or firewall change has occurred on any asset profiled.
  3. HIDE can alert our client of any change to their external asset profile on an ongoing basis using various methods such as SMS, email or Live Feed.
If, as per traditional approaches to profiling, we only assess named endpoints we don't get the full picture. HIDE eliminates network blindspots

So pretty much HIDE can help detect for example:

  • The dev team deploy a server for testing without knowledge of security. 
  • A rogue exfiltration point is established similar to an APT
  • A rogue service is deployed to exfiltrate data
Detection is performed in edgescan via profile DELTA ANALYSIS on a continuous basis so we detect change in near-realtime.

Via the portal edgescan users can query HIDE information across thousands of servers in seconds. This can be done by using our filtering API on the console. So if a user needs to query all systems with say "Ports 443/80 open running Linux" across thousands of servers this can be done in seconds and downloaded into CSV, XLSX etc.
Clients with large estates (1000's of IP's/Servers) find this a very useful feature of edgescan

Obviously our edgescan API can be used to query this information also without using the GUI.

Alerting is also configurable such that DevOps staff can be alerted when defined incidents take place.

HIDE gives edgescan clients the ability to monitor and profile systems and alert them of any changes to their estate profile in minutes.

Security done wrong and blowing the not to secure your business

The State of Cyber Security:

We don't want a 15 year old breaching our systems, stealing data and taking 13% off our share price as a result.....hmm I think not. If I wanna be hacked the hacker has got to be elite and like an uber hacker right!!

It is strikingly obvious that security is still weak for both the large enterprise and smaller organisations alike. Take TalkTalk hacked by 15yr old for example...

We live in a world where multi-million euro businesses can be drastically hit by ANYONE with the will, determination and curiosity, I sh*t you not!!.

Poor practices we accept in the industry

Yearly security testing on sites & systems that change frequently

We perform annual testing of our systems, in a time limited manner. Our systems are in a constant state of flux (for the below reasons) but we still only do the annual security test. 

See anything wrong here? 3 words  for you...Window Of Exposure
  • Changes in code

Happen more frequently, we are more "Agile" than ever. We push code frequently and spread the risk of dev failure as opposed to hoping everything works at the end of the project. The more we change the less valuable our previous security report is. Within days of a security test the value of the report is degraded due to the system having changed since the report was written. With this in mind, as change occurs and no security verification is done our window of exposure grows.

  • Changes in supporting environment. 

We patch systems where we can as per our patch management policy but this is never as easy as it sounds. Patching live systems can result in negative effects to the hosted systems. Patches can break stuff!!  So we don't patch as often...On a day to day basis we are secure one day the next we have a vulnerability because it has just been discovered and made public knowledge. Annual testing does not scale to the dynamic nature of the systems we manage and own.

Automate everything

  • Highly automated is weak there are many aspects of web data flow which breaks automation and reduces coverage.
  • Highly automated solutions can result in impacting/harming live systems such as submission of 1000's of emails/tickets, impacting performance, exhaustion of system resources.
  • Highly automated solutions can submit sensitive webforms and corrupt data or system state.
  • Many vulnerability scanners can submit invasive attacks which appear idempotent but in the context of the system they are very destructive.
  • Un-tuned automation can result in DoS (Denial of Service) issues. Many scanners use excessive aggressiveness when scanning. 

Risk is not linear

  • Automation does not understand risk.
  • Risk is a human concept and needs to be assessed by humans
  • Not all vulnerabilities are equal and depends on logical context and where a given type of vulnerability is situated.

Secure the WebApp

  • Developer Code Only

Is a web application only Developer Code? It appears from various studies that circa 90% of an average web application is framework/component code and not written by the developer at all. - focusing on developer written code alone is not application security!!

  • Component Security

As an industry we don't talk much about the 90% of code running our web applications which we did not develop...funny that. - without component security you are not doing application security

Like do we maintain components/frameworks as we patch OS's??  - No hope. 
Do we have a component security policy the same way we have a patch management policy?  - Nope

  • OS Security

65% of vulnerabilities are due to poor patching, misconfiguration or deprecated services. Yep 65% of vulnerabilities - edgescan vulnerability stats report 2015. "Hackers don't give a Sh1t" so if you have focused on web app security only they shall come in via the OS! Make sense?

  • We use SSL - (yes I've said it) - People still say this - No idea why given SSL V2 and V3 is broken!!

  • We use a WAF - (again more bullsh*t). Logical vulnerabilities, Behavioural wekanesses thats where the money is anyways!! Your WAF don't mean diddly on its own as it only detects technical attacks, not logical weaknesses.

edgescan is a cloud-based continuous vulnerability management service. It is a highly accurate SaaS (Security-as-a-Service) solution which helps clients to discover and manage application and network vulnerabilities (full-stack information security) on an ongoing basis. All vulnerabilities are verified by our security analysts which results in accurate, false-positive free vulnerability management. edgescan has been recognised by Gartner as a “Notable Vendor” in the Magic Quadrant for Managed Security Services 2015.