{"id":25308,"date":"2017-03-16T05:00:41","date_gmt":"2017-03-16T12:00:41","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=25308"},"modified":"2017-03-29T08:56:29","modified_gmt":"2017-03-29T15:56:29","slug":"gov-securing-government-heres-learn-2016","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2017\/03\/gov-securing-government-heres-learn-2016\/","title":{"rendered":"Securing Government: Here\u2019s What We Should Learn from 2016"},"content":{"rendered":"<p>I recently presented about securing government at the 2017 Cyber Defense &amp; Network Security (CDANS) conference in the United Kingdom. As I was preparing remarks for senior U.S. and EMEA military leadership, and as I\u2019ve done in years past for this annual conference, I began pondering 2016 in the context of securing our networks. What could I advocate to these leaders that was different than I have advocated in years past? \u00a0After all, we\u2019re seeing some of the same issues \u2013 made even more urgent by our evolving networks into public clouds, and with our data more widely dispersed than ever before.<\/p>\n<p>Entering 2017 with more electric grid attacks, a year of pervasive and successful ransomware, attack campaigns of years past that succeeded once again, and now our first ever botnet of things, what could I say to encourage these leaders and help us focus not on the past but on lessons for a very positive start to 2017? Well, as it turns out, quite a bit. What follows are my observations and thoughts for using 2017 to course-correct with both the recognizable patterns and greater attention to best practices to ensure our defense in depth strategies are agile.<\/p>\n<p><em>First, let me pose a question to you: Coming out of 2016, what do you feel is the number one way in which attackers are ahead of our enterprise security efforts?\u00a0 I would posit that it\u2019s automation \u2013 with collaboration a close second. <\/em>As I looked at some of the 2016 cyber malicious activities and events, the automation theme was pervasive and growing:<\/p>\n<ul>\n<li><em>Ransomware <\/em><\/li>\n<li><em>Return and use of macros<\/em><\/li>\n<li><em>Mirai botnet and the \u201cBotnet of Things\u201d attack<\/em><\/li>\n<li><em>\u201cOilRig\u201d campaign<\/em><\/li>\n<li><em>\u201cShamoon 2\u201d attacks<\/em><\/li>\n<li><em>Yahoo: biggest breach of one source to date<\/em><\/li>\n<li><em>Russian gang amass of 1.2B credentials<\/em><\/li>\n<\/ul>\n<p>I won\u2019t use this blog post to repeat the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/unit42\/\">many details we\u2019ve already published from the year<\/a>. But I do want to reiterate the good news that I repeated to the audience at CDANS, and even more with the <a href=\"https:\/\/www.paloaltonetworks.com\/products\/new\/new-panos8-0\">latest release of our PAN-OS 8.0<\/a>: you, too, have <em>automation<\/em> available to protect your data and your network assets. (More on that later.)<\/p>\n<p>Late in 2016, I commissioned a study of how the U.S. federal government is using automation to improve all aspects of its attack mitigation processes \u2013 from external threat intelligence consumption to what security sensors and capabilities are doing to help. The results, published in MeriTalk\u2019s <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/meritalk-pedal-to-the-metal\"><strong>\u201cPedal to the Metal\u201d<\/strong><\/a> report, were in some ways disappointing, yet were informative in where I feel Palo Alto Networks can help.<\/p>\n<p>Here are some highlights:<\/p>\n<ul>\n<li>Fewer than half of U.S. federal agencies guard against emerging and critical attack vectors, increasingly used as attack entry points.\n<ul>\n<li>Most focus on traditional entry points (mail server, internet gateway, web)<\/li>\n<\/ul>\n<\/li>\n<li>55 percent say their agency is currently not <u>automatically<\/u> correlating threat campaign information from <em><u>different locations<\/u><\/em>\n<ul>\n<li>30 percent do so manually, and<\/li>\n<li>25 percent don\u2019t do it at all<\/li>\n<\/ul>\n<\/li>\n<li>When faced with a new (unknown) threat\u2026\n<ul>\n<li>A low 15 percent can <em>create <\/em>new protections within a few minutes (over a third still take days to take any action)<\/li>\n<li>Only 17 percent can <em>distribute<\/em> new protections within a few minutes<\/li>\n<\/ul>\n<\/li>\n<li>Security operations teams ingest an average of 25 external threat feeds daily\n<ul>\n<li>47 percent: Still purchase feeds only consumed via email<\/li>\n<li>72 percent: Few hours to a few days to assess presence of unique threat and determine whether actionable<\/li>\n<li>81 percent: Few hours to a few days to create actionable changes in security posture to protect against a new threat received from external sources<\/li>\n<\/ul>\n<\/li>\n<li>Security operations teams are allocating skilled and limited resources on tasks that can be automated<\/li>\n<\/ul>\n<p>Most don\u2019t need <em>more<\/em> data (or people to review it) but the ability to make <em>faster decisions <\/em>from the data they have. But do they understand that?<\/p>\n<p>As Einstein said, \u201cWe cannot solve our problems with the same thinking we used when we created them.\u201d It\u2019s time to embrace innovations in automation, just as we\u2019re seeing governments now slowly but surely embrace the cloud. Reduce time to act on anything new hitting your networks. Your goal with today\u2019s technology should be under five minutes for new protection to be created and deployed. This could be malware signature creation, detecting and blocking new IP addresses and domains associated with command-and-control infrastructure. When it comes to exploits, they can be stopped immediately \u2013 don\u2019t settle for anything less.<\/p>\n<p>For government, these changes may seem like radical departures but keep in mind that you can start with incremental change to a long-term goal. Don\u2019t be overwhelmed. Perhaps start with one aspect of your network with:<\/p>\n<ol>\n<li>Security focused on one location that\u2019s more vulnerable<\/li>\n<li>Security focused on one aspect of the threat<\/li>\n<li>Security focused on one attack vector (internet gateway, north\/south into your data center, east\/west traffic within your data center, Office 365 and Azure environments, your use of SaaS applications, etc.)<\/li>\n<li>Preventing phishing: You can detect if a link in an email is malicious, and then block connections to those sites.<\/li>\n<li>Preventing stolen credentials: Now in PAN-OS 8.0, you can block authenticated lateral movement, using multi-factor authentication within the network, from adversaries trying to compromise a network.<\/li>\n<li>Reduction of efforts and time to correlate and make actionable use of threat intelligence (from internal and external sources). With our MineMeld tool that\u2019s offered as freeware or supported as part of AutoFocus, you can even do correlation, de-duplication, and can create automatic blocklists from your threat intelligence feeds.<\/li>\n<li>The people part of the equation. I still hear stories about teams refusing to work together. Resolve to improve teaming between those with security responsibility. Perhaps choose two teams to focus improved communication: start with network and IT security teams, later adding collaboration with DevOps, endpoint and other teams. And don\u2019t forget to include the ICS &amp; SCADA teams, where applicable.<\/li>\n<\/ol>\n<p>For your OT environments, if your country doesn\u2019t have regulatory guidelines, use NERC CIPv5 as your baseline, and consider the <a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/ICS\/secure-architecture-industrial-control-systems-36327\" rel=\"nofollow,noopener\" >Purdue model<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/03\/Pic_1.png\"><div style=\"max-width:100%\" data-width=\"899\"><span class=\"ar-custom\" style=\"padding-bottom:56.17%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-25311 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/03\/Pic_1.png\" alt=\"pic_1\" width=\"899\" height=\"505\" \/><\/span><\/div><\/a><\/p>\n<p>I used a military analogy to which many can relate \u2013 regardless if you were ever part of an airborne mission or are a gamer. Looking out of that cockpit, traversing enemy territory, the timeliness (and accuracy) of the information that you receive is critical. Just as in the physical domain, <em>every second counts in our cyber domain<\/em>. We don\u2019t have to repeat the mistakes of 2016. It <em><u>is<\/u><\/em> possible to appropriately secure our data and networks \u2013 however we extend them from SaaS to public cloud to remote locations to support our troops, our government operations, and our citizen services.\u00a0 <strong>Let\u2019s use 2017 to reclaim control and use automation to<em> <u>our<\/u> <\/em>advantage <\/strong>\u2013 to reduce the risk to our governments and critical infrastructure and to ensure the resiliency of our digital way of life.<\/p>\n<p>To learn more about our other activities at CDANS 2017 this year, please visit:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/gov-cdans-2017-keeping-cybersecurity-skills-sharp-cyber-range\/\">CDANS 2017: Keeping Cybersecurity Skills Sharp With Cyber Range <\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/03\/securing-networks-women-cyber\/\">Securing Our Networks with Women in Cyber<\/a><\/li>\n<\/ul>\n<p>And if you haven\u2019t had a chance, please read about all of the exciting <a href=\"https:\/\/www.paloaltonetworks.com\/products\/new\/new-panos8-0\">enhancements we made in PAN-OS 8.0<\/a>.<\/p>\n<h3><a href=\"https:\/\/ignite.paloaltonetworks.com\/federal\/federalhome.html\"><img decoding=\"async\"  class=\"alignnone size-medium lozad\"  data-src=\"https:\/\/ignite.paloaltonetworks.com\/federal\/assets\/img\/masthead_federal.png\" alt=\"\" width=\"1000\" \/><\/a><\/h3>\n<h3>Federal Ignite '17 Security Conference: Washington, DC<\/h3>\n<p>If you are in the U.S. government, come to <a href=\"https:\/\/ignite.paloaltonetworks.com\/federal\/federalhome.html\">Federal Ignite 2017<\/a> to learn more about what we\u2019re doing for you and your peers to make fast threat prevention through automation a reality.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pamela Warren explores lessons learned from 2016 and how they can provide insight to government leaders preparing for the future.<\/p>\n","protected":false},"author":47,"featured_media":20199,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[484],"tags":[161,3342,3399,3402,123,3003],"coauthors":[717],"class_list":["post-25308","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","tag-automation","tag-cdans","tag-defence","tag-defense","tag-government2","tag-military"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/09\/government-web-banner-650x300.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=25308"}],"version-history":[{"count":8,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25308\/revisions"}],"predecessor-version":[{"id":25920,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25308\/revisions\/25920"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20199"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=25308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=25308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=25308"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=25308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}