Overview
Quick Teardown
Guidance for All Organizations
Recommendations for Corporate Leaders and CISO's
Summary and What's Next
The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Agency (CISA) issued a "SHIELDS UP" advisory. In this blog, we will do a quick tear down outlining how to implement controls for important asset categories including productivity endpoints (Windows and MacOS laptops) and cloud infrastructure (Linux, Containers and Cloud Service Providers).
The intent of this quick teardown is to scope and assess how to map the Shields-up guidance to key controls and how to measure the effectiveness of these controls and summarize it for the corporate leaders and CISO’s.
We propose a segmented approach for proactive, reactive and protective controls to align with the guidance for all orgs and a summarization for corporate leaders and CISO’s.
We propose proactive audit controls such as CIS-based audting, telemetry-based visibility with tools such as osquery along side asset inventory and vulnerability detection.
Advanced reactive runtime detection tools play a key part of reactive security controls. This is where one has to consider looking beyond vendor provided security controls.
The nature of these threats is beyond the traditional research-driven prescriptive solutions offered by security vendors. It is likely that new toolkits and malicious software is being developed and released, which is not known to the vendor community yet for analysis and detection.
Advanced Yara-based scanning plus MITRE-based behavioral models can lay a sound foundation towards detecting new and hitherto unknown malicious behavior.
Protective and contextual detection controls play an important role for investigating intrusions. Having a rich telemetry-based contextual security data lake is useful for threat investigation, forensics, compliance and audit. Access to historical visibility in a structured data lake plays a significant role towards supporting this guidance.
A telemetry rich, data lake-based model helps to have the right context and training for investigation and hunting and remediation.
Invest in a security data lake for history, invest in purple teaming for collaborative testing to detect flaws upon restoration from backup.
In subsequent posts, we will provide a deeper dive on how-to implement controls to align with key parts of the advisory.