pritha's Posts (624)

Sort by

CISO Report: Monthly Breach Report June 2020

FC-Security-Breach.png-930x620.png?profile=RESIZE_710x

This is a cross post from original source at FireCompass here

This report summarizes the top breaches between mid May to mid June 2020 accounting for the major breaches the world has seen. This helps you in keeping track of the latest hacks and safeguarding your organization by looking at the trends. We share insights to the breach

1.“Bank Of America (BofA) Data Breach”

Bank Of America Corporation during late May notified of a third party breach through their PPP (Paycheck Protection Program). Compromised information included Address/TIN, Name, SSN, Phone, Email, Citizenship Status. The number of accounts affected were not declared. Officials have notified necessary measures are being taken

2.“BHIM Wallet App Data Breach”

Another Amazon S3 bucket misconfiguration data breach. Since it’s a payment app, the breach exposed financial and personal details. The approximate is 7 million indian citizen records being affected. The exposed data includes Aadhaar number, DOB, name, gender, biometrics, PAN, Address etc. NPCI has denied any breach. *P.S: The breach was at the CSC (Common Service Center), which is responsible for the website, and has nothing to do with the payment app - BHIM.  The company responsible for development of the website & the care-taker of sensitive data is understood to be the Common Services Center(CSC) e-Governance Services Ltd.  The CSC scheme is one of the mission mode projects under the Digital India Programme. 

3.“Joomla Data Breach”

Joomla is an open source CMS (content management system). A member of the team left a complete backup of the JRD site (resources.joomla.org) on a AWS S3 bucket. It is known the backup was not encrypted and had around 2,700 registrants. If exposure, details such as name, business id, phone, nature of business, encrypted password etc. could be exposed

4.“Keepnet Data Breach”

Keepnet labs notified an agent exposed 5Billion records database. During maintenance, the firewall was paused for a few minutes when the database got  indexed by BinaryEdge. Post this the link was accessible without a password. However no customer data was exposed. It only had previously publicly available data

5.“MU Health Data Breach”

Missouri Health Care has notified patients of a september data breach. Information stolen may include name, DOB, medical record numbers, health insurance detail etc. An incident was noticed where an access was noted to email accounts of MU students affiliated with MU Health.

6."San Antonio Aerospace Breach"

The maze ransomware gang hit VT San Antonio and released their data (unencrypted files) from company’s compromised devices. This company is a major American MRO (maintenance, repair, overhaul). They work with defense services, governments and commercial segments in 100 + countries.

Get a free report of your organization’s attack surface from a hacker’s viewpoint (Unsanctioned Cloud Assets, Digital Footprint, Phishing Risks, Misconfigured Infrastructure & more.) The report will be shown as a part of the demo. Here is the link To Get A Free Report
* Limited number of assessments

Read more…

Third party vendors and suppliers often have access to your network and your organisation's confidential information. The best way to prevent a data breach is to have robust program to assess how your third parties are managing their risk and protecting your data. Organisations must have a clear understanding of the risks inherent in their business relationships with third parties. How should you approach managing third party risk?

Wayne Tufek (Frequent speaker at RSA Conference) will be joining us to discuss the topic

>> Register here to join us here

What Will You Learn ?

-Discuss the major failings of traditional third party risk management programs
-Creating a supply chain awareness program
-Creating a comprehensive catalogue of vendors and suppliers
-Risk based segmentation of identified vendors and suppliers
-Risk assessment and rules based due diligence activities
-The key contractual clauses all contracts with third parties should contain and why
-Methods for continuous monitoring
-How to develop and present a supplier risk dashboard for management
-A model for a comprehensive process to effectively and efficiently manage third party risk

>> Register here to join us here

Read more…

Maze Ransomware Attacks Cognizant

A large enterprise cognizant has released a notification regarding the maze ransomware attack. The team is working on various aspects to contain the incident. However, this puts us in a shocking position to understand how vulnerable major companies are. There have been various previous reports on this notorious malware

Maze Ransomware Hits Cognizant

Currently, the company has a statement informing their cyber security team is actively taking steps to contain it. They have had service disruptions in certain areas due to the attack

Detailed Blog Contains : 
  • Current incident status
  • How it happened ?
  • What could be done to prevent it ?
>> Read the detailed blog here : Blog on Maze Ransomware Attack On CTS
Read more…
8669829076?profile=original
Topic : Evolution Of AI : Past, Present, Future (Dr. Monojit Choudhury)
Brief - This session is about AI and how AI revolutionized almost every aspect of human lives - from healthcare to agriculture, and from fashion to political campaigns. There is a lot of excitement as well as fear around the future promises of AI. Yet, speculations abound that we are soon going to hit the third AI winter. In this talk, I will try to address some these questions and speculations. I will use examples from the domain of Natural language processing (NLP) - allegedly one of the hardest areas of AI - to illustrate what we have achieved, what are the promises offered by the recent advances in deep learning and why there are certain problems that are too difficult for any of the current approaches to handle. I will also highlight the non-AI aspects of AI system building (aka data creation and engineering) which are the unsung foundations of most practical AI systems.

Dr. Monojit Choudhury - Security Research, Artificial Intelligence

>> Download The Full Guide With Access To All Talks Here8669829286?profile=original

Read more…

(Free PPTs) Top Talks @ SACON - 2020 !

Get free access to the presentations by Gregory Pickett Nandan NilekaniAndrea MarcelliJames StangerJim HietalaShivangi NadkarniMonojit ChoudhurySrinivas Poosarla & more. SACON is one of the largest Security Architecture Conferences in APAC region. With over 600+ participants, this was the 7th edition of SACON and here are a few highlights we wanted to share with you. It was held on 21-22nd Feb, Bangalore, India. All sessions were workshop style with 3-4 hours or 6-8 hours of hands on training.

8669830882?profile=original

We had with us Top Security Industry Leaders who helped SACON with great content. For more details & to pre-register for next year visit: sacon.io

01. Adventures in SDN Security (Gregory Pickett)

This session is based on a recent talk of mine on SDN and 5G, this will be a deep dive into the Software Defined Network (SDN) side of things. We will hit SDN and hit it hard. After a rundown of recent work in SD-WAN, I will return to where it all started with the Software Defined Data Center (SDDC). Briefly reviewing my previous work with open source controllers and white box switches, we will take a look at my recent work with Cisco’s APIC and Big Switch Network’s Big Switch Fabric. This will be a deeply technical talk where we will cover the risks, the threats, and the attacks useful against SDN. Most importantly, we will talk about how to secure it. Because if your network isn’t safe, neither are you.

 
 


02. Windows Malware 101: Reverse Engineering and Signature Generation (Andrea Marcelli)

This session is about workshop which cover some key topics of Windows malware reverse engineering, starting from the basics of the Windows executable file format up to the modern techniques and FOSS services to analyze malware samples at scale. Finally, it will cover the basics of malware signatures, and it will present a tool, YaYaGenPE, to automatically generate them. During the workshop, Python notebooks and other FOSS tools will be used to show an interactive analysis of some recent Windows malware samples.

<Speaker will share modified version of slide post online session with attendees>
 
 


03. Zero Trust Architecture: From Hype to Reality (Jim Hietala)

This session is understanding about Zero Trust Architecture and strategies to secure corporate assets. ZTA may allow us to create more enduring security architectures, with less entropy vs. today's security architectures. However, lack of enabling standards is causing confusion about what ZTA is and vendor hype isn't helping either. This session will describe the current state of ZTA, and standards initiatives that may help bring clarity and reduce barriers to adoption.

 
 


04. Surfing today’s emerging tech: A policy-based approach (Dr. James Stanger)

This session talk focuses on managing cybersecurity issues that surround today’s implementations of emerging technology, including shadow IT

 
 

05. Identity Payments and Data Empowerment  (Nandan Nilekani)
This session is about Identity Payments and Data Empowerment Addressing Different challenges, Solving the Challenges, Payment challenges, Data Sharing and Privacy Challenges.
Putting in perspective: Innovation in digital age.

 
 


06. Evolution Of AI : Past, Present, Future (Dr. Monojit Choudhury)
This session is about AI and how AI revolutionized almost every aspect of human lives - from healthcare to agriculture, and from fashion to political campaigns. There is a lot of excitement as well as fear around the future promises of AI. Yet, speculations abound that we are soon going to hit the third AI winter. In this talk, I will try to address some these questions and speculations. I will use examples from the domain of Natural language processing (NLP) - allegedly one of the hardest areas of AI - to illustrate what we have achieved, what are the promises offered by the recent advances in deep learning and why there are certain problems that are too difficult for any of the current approaches to handle. I will also highlight the non-AI aspects of AI system building (aka data creation and engineering) which are the unsung foundations of most practical AI systems.

 
 


07. Attack vectors of Kubernetes infra. Are we on right path of securing it? (Anand Tapikar)

This session is about understanding Kubernetes(K8s). Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. K8s groups containers that make up an application into logical units for easy management and discovery. It was originally designed by Google and is now maintained by the Cloud Native Computing Foundation. As organizations accelerate their adoption of containers and container orchestrators, they will need to take necessary steps to protect such a critical part of their compute infrastructure.

How this topic is relevant 1 out of 5 organization going for container installation Container security attack vectors are rising Recently major vulnerability discovered in containers and got good media attention Duration (Mentioned on sacon.io, if not as per program committee call).

 
 
08. Hacking and Securing Kubernetes and Dockers in Cloud - Hands-on (Apoorv Raj Saxena)
This sessison is based on recent research of mine this will be a Hands-on demonstration of Docker and Kubernetes exploitation and a deep dive on how to achieve remote code execution through low hanging fruits of docker and Kubernetes.

 
 
09. On The Wings of Time: Past, Present and Future of Radio Communication (Harshit Agrawal)
This session is about Radio Communication. Recent years have seen a flood of novel wireless exploits, from vulnerable medical devices to hacked OT devices, with exploitation moving beyond 802.11 and into more obscure standard and proprietary protocols. While other non-WiFi RF protocols remain a mystery to many security practitioners, exploiting them is easier than one might think. Today, cyber threats have grown not just in its depth (more sophisticated) but also in its breadth (expanded scope). It has grown from threats in Enterprise IT systems to Operation Technologies (OT) and Industrial Control Systems (ICS).

 
 
10.  How does an attacker know everything about your organization? - Know the Unknowns (Nilanjan, Jitendra chauhan & Abhisek Datta)
This session is understanding about know the unknowns. It is possible to create a comprehensive attack surface of any organizations just with open data available on the public internet It is possible to search vulnerable targets and compromise the targets. The organizations can be compromised without any RCE vulnerability. It is possible to create inhouse team to continuously monitor your attack surface and fix flaws before attackers find them.

 
 
11.  Quantum safe Networks (M T Karunakaran)
This session is about Quantum Safe Networks. Quantum computers are becoming a reality.
The classical key distrbution algorithms,based oncomputational complexity are under threat.

 
 
12.  Practical Exploitation of IoT Networks and Ecosystems workshop (Nitin Lakshmanan & Sanjay V)
The session is about understanding IoT Networks and Ecosystems. Internet of Things (IoT) market today is defined by product manufacturers pushing a broad spectrum of computing devices out to the hands of consumers at an ever-increasing pace, and connecting them to the Internet. They are in a rush to hit the market shelves before their competitors and they often marginalize security. In this workshop, we offer hands-on training for pentesting and hardening IoT ecosystems, with special focus on popular communication protocols such as Zigbee, Bluetooth & BLE, as well as Device - Mobile - Cloud security topics. Students will learn about weaknesses in consumer IoT devices (wearables) paired with mobile ecosystems (Android & iOS) — how information theft is scarily easy, and what steps can be taken to harden these designs.We conclude with defensive security best practices and next generation SDLC for the products of tomorrow.
8669830694?profile=original
 
 
13.  Metron & Blitz, Building and scaling your own Open Source SIEM & SOAR (Pradyumn Nand & Mrinal Pande)
The session is about SIEM & SOAR. Open Source technologies are being widely adopted to help SOC / DevSecOps teams in day to day operations. We'll be showcasing how we've built our SIEM using Apache Metron with a custom SOAR layer - Blitz over it to alert and respond to threats in real time. We'll deep dive into the architecture of both platforms and demonstrate various use cases covering cloud infra, endpoint devices, outbound traffic and perimeter security threats. We'll also present how to automate remediation to alerts and scale the setup for orchestration and threat hunting.

8669830694?profile=original
 
 
14.  DevSecOps Tools and Beyond (Satish Sreenivasaiah)
This session will provide details on the usage of OSS tools to secure your dev and ops lifecycle. It covers tools used in application, host and network security assessments for both monolithic and Microservices based architectures. The session also covers usage of OSS tools for runtime application self-protection. Apart from tools in development phase, the session provides insights on building secure design into the product via threat modeling tool.
8669830694?profile=original
 
 
15.  An introduction to Data Privacy (Shivangi Nadkarni & Sandeep Rao)
This session is about Introduction to Data Privacy. Data Privacy & Personal Data Protection has become a key driver today in dialogues involving data. India is at the cusp of getting its own law in place - one of the last few countries in the world to do so. However, the reality on the ground is that few people really understand what Data Privacy is all about. It is often confused with Data Security. This session seeks to de-mystify Data Privacy, giving an overview of the domain and how it is different from Data Security.

8669830694?profile=original
 
 
16. Personal Data Discovery & Mapping - Challenges faced, Methodologies & Tools employed​ (Ramkumar Narayanan)
This session is about how to implement any privacy program in any organization - big or small - the foundational step is to understand what Personal Data an organization deals with, where it lies, how it flows (within & outside the organization), who does what with that data, what are the underlying assets involved, etc. Without this foundation, the organization cannot build the necessary controls required to implement and manage Privacy. However, this is not an easy probem to address. This session does a deep dive into the challenges faced, the methodologies used and tools that can be employed to build AND sustain an organization's data map.
 
 
17.  India's Personal Data Protection Bill - an overview (Aaron kamath)
This Session is to understand an overview about India's Personal Data Protection Bill. India's Personal Data Protection Bill (PDPB) has been in the news for a while now. One of the most awaited legislations around the world, the bill has intoduced many new ideas which are different from other legislations like the EU GDPR,etc. The bill has also raised many controversies and debates both in India and globally. This session focuses on what the India PDPB is all about.

 
 
18. Implementing a Privacy Program in a large Conglomerate: Challenges & Learnings (Gauri Vishwas)
This session is to understand what the various applicable Privacy laws & standards require an organization to do and another thing to actually implement a program to deliver on this requirement within the organization. Data Privacy programs cut across almost all functions & teams in an organization - all of whom need to work in sync to 'make it all happen'. When it is a large conglomerate spanning multiple countries and entities, this challenge is further amplified. This session discusses these real life issues and challenges.

 
 
19. Implementing a Privacy Program in an SME Organization: Challenges & Learnings (Apurva Mankad)
This session Most discuss around Privacy & its implementation focus on large organizations. However, small organizations also need to implement Data Privacy. And their challenges are very different. Small Teams, limited budgets & other constraints are a reality. This session has the founder & CEO of one such organization share his experience & learnings.

 
 
20. Challenges & Approach (Srinivas Poosarla)
This session is about challenges and approach of 27001 to 27701. ISO 27701 is a new standard for privacy protection, built as an extension to ISO 27001 & 27002. Released as recently as August of 2019, organizations and practitioners are still trying to understand the standard and its intricacies & implications. Infosys is the first Indian company to have been 27701 certified - a result of a long-running Privacy Program with a team having the necessary expertise and experience of many years in the domain. In this session, the Infosys Chief Privacy Officer shares their journey and offers key insights and learnings to organizations on their paths to achieving 27701

 
 
21. Privacy in Technology: Kickstart of the Hackathon (Sameer Anja)

This session is to understand privacy in technology. Just like in the case of Security, building Privacy at the design stage itself ensures privacy gets baked into the specific application/ process/ initiative. There is a formal Privacy By Design (PbD) framework available and it has been incorporated into several laws & regulations as well. To actually implement PbD into specific applications needs the translation and application of this framework and its principles into specific, detailed, step by step guidelines/ standards. This Hackathon endeavours to do exactly that

 
 
22.  A scalable, control-based, developer-centric Threat Modelling for secure software development (Dr. Soumya Maity & Lokesh Balu)
This session is about Threat Modelling for  secure software development.A comprehensive application threat model demands specialized skills and expertise which might be difficult to avail considering the increasing resource gap in software security market. Making a scalable threat model framework is difficult even for big enterprises. Even the tools that help to manage the threat modeling process have limitations. In this talk, we will present control-based threat modeling to explore the possibilities of moving from a traditional threat-library based threat model to a more developer-centric threat model and how this paradigm change may add value towards developing secure software.

 
 
23. The Power of APIs – API Economy Trends & Market Drivers, Security Risks and Mitigation Strategies (Suhas Desai)
The session will focus on delivering the key trends in APIs, API Management Platform technologies and how it is driving the API economy. We will also discuss the key drivers for digital transformation initiatives which include wide acceptance of APIs in Industry 4.0, Connected Devices, Cloud and Payments industry. Next, we will talk about the top 10 security risks in APIs, API Management Platforms, APIs integrations with cloud platforms, IoT/OT devices integrations with third-party applications. Lastly, we will uncover the need for implementing the API security governance framework and how to measure the API security programme’ s success through this governance framework.

 
 
24. Living In A World of Zero Trust (Vandana Verma)

This session is about Zero Trust and has of now everything is moving to cloud, all the applications are accessible from anywhere and everywhere. However, No one wants their private information to be compromised and openly available for the world. We have been taking so many precautions, however breaches continue to happen. How should we fix this?

Organisations have been talking about Zero Trust lately and this has become a buzzword. The talk will explore Zero Trust beyond the buzzword and describe what exactly is Zero Trust and why it is so important to keep organisations safe. How can we implement or deploy Zero Trust in an organisation while keeping the current and future state of an organization in mind. What should be the business model to move any organisation towards Zero Trust Architecture and what all policies need to be implemented to achieve the same.

In the end, certain recommendations will be shared with the participants as a takeaway from my own experiences while working towards implementing the Zero Trust.

 
 

25. Practical Threat Hunting - Developing and Running a Successful Threat Hunting Program (Wasim Halani & Arpan Raval)

The workshop is intended to demonstrate how to develop and run a threat-hunting program in an organization. It starts with understand the concepts of threat-hunting and how it fits into an organization’s BlueTeam. The workshop will cover hands-on sessions on running a structure and unstructured hunt using different log sources commonly available in an IT environment.

8669830694?profile=original
 
 
 
 
Some other sessions conducted at SACON (no presentation) : 
  • Darkweb workshop (Rohit Srivastwa & Muslim Koser) Old Reference Link
  • Web hacking using Cyber Range (Satish S)
  • Leadership - the power of influence (Haragopal Mangipudi)
  • Cybercrime Response - Legal & Technical perspectives (Venkatesh Murthy K)
  • Ensuring Effective AWS Security on a Budget (Vikas Yadav & Bhowmik Shah)

In case any speaker chooses to send more presentations, we will upload those here

Photo Link

  • SACON 2020 Album Click Here (Medium Resolution)
    Use this to share on social media easily. Tag @cisoplatform
  • SACON 2020 Downloadable Pics Click Here (High Resolution).
    Sign in with google account. Right click and download file needed
  • Annual Summit Album link - Click Here

  • Here's the CISO Platform 100 Recognition Photo Album Link - Click Here

  • Please upload any good event picture we missed and you took (Community Folder) - Click Here
    Sign in with google account and drag drop your photograph files

Read more…

Cyber Security for kids - Repository

[PPT] CYBER Safety Training For Young Students:

[PPT] Cyber Safety For Kids

The Dark Side Of The Internet :

Keeping Your Family Safe Online :

More Research - What Kids are Telling Us :

Kids Online - Keeping Them Safe :

Cyber Safety: Kids - I'm In, R U? :

"it" Apps and How Kids Use Them :

Why Kids Are Online :

What Kids Think, Want, Say :

National Children's Internet Usage Study :

A New Approach for CyberSafety Rules and the "Tech Talk" with Kids :

All Children Left Behind :

Making it a Safe Cyber - World One Person at a Time :

Top Three Online Threats: What Can Harm Our Kids? :

Risks, Harms and Rewards of Our and Our Kids' Online Lives :

Challenges Faced By Kids Online :

"It's Everybody's Kids" :

Securing Today's Online Kids - Cyber Safety for Kids :

Speak to Your Children - CyberSafety for Kids :

Take the Journey Together - Cyber Safety of Kids :

The Day My Kids Brought Home Malware :

Hacking :

The True Story of Alicia :

How to Use Better Passwords :

Staying Safe Online :

The Internet is A Sticky Place :

Read more…

According to research from Risk Based Security, the total number of breaches was up 33% over last year. That’s a whopping 5,183 data breaches for a total of 7.9 billion exposed records and in November, the research firm called 2019 the “worst year on record” for breaches…

Not having real time view of your dynamic attack surface and the risks it is introducing, leaves an organization in the dark and serves as a low hanging fruit for attackers to use this exposed information to fuel their malicious attacks. Shadow IT, 3rd Party Vendor Risks, Cloud-based storage companies like AWS- Amazon Web Services, ElasticSearch surfaced multiple times.

2019 Top Breaches & Analysis :

Marriott faced a fine of $124 million proposed by UK regulators under the EU’s new privacy rules. Before being discovered, the breach persisted for 4 years, dated back to 2014 but was not discovered until November 2018. Marriott said the long-running breach exposed such information as names, email addresses, phone numbers, passport numbers, encrypted payment card information and more. The breach appears to have begun with a 2014 network hack of Starwood Hotels & Resorts Worldwide, which Marriott acquired in September 2016. 

….Read Detailed Analysis

 

$230m fine was proposed as penalty to British Airways from the Information Commissioner’s Office for the data breach that is believed to have affected thousands of their customers between April and June 2018. The breach was disclosed in September.

….Read Detailed Analysis

 

(NASA Hacked) On 21 June, 2019 major news channels disclosed a major hack on NASA. Hackers were able to gain unauthorized access using Raspberry Pi and stole ‘Mars Mission Data’ and breached ‘NASA’s satellite dish network’. This happened around April 2018 and went unnoticed for for almost a year. It is advisable to do an attack surface analysis for an organization to have a know-how of all the access and assets

….Read Detailed Analysis

 

$700m was to be paid by credit score agency Equifax as part of a settlement for data breach in 2017. The breach is known to expose data of at least 147 million people. It is FTC’s largest data-breach settlement, much above the uber penalty of $148m. 

.…Read Detailed Analysis

 

Capital One data breach affected over 106 million people, 140,000 Social Security numbers, 80,000 bank account numbers,1,000,000 Social Insurance Numbers … The breach had taken place about 4 months back however it took some time before the breach was realised, in-fact it took an external tip for Capital One to realise something had happened. The legal case built was quite interesting. It resulted in the loss of names, addresses, postal codes, phone numbers, email addresses, dates of birth, self-reported incomes, credit scores, credit limits, balances, payment history and contact records from 2005 to 2019
….Read Detailed Analysis

 

This year July, facebook settled for a $5billion worth settlement with US Federal Trade Commission for its privacy failures in Cambridge Analytica case. Recently, they have disclosed a group of developers around 100 had access to additional information of people in groups. Malicious apps have leaked personal data of facebook and twitter users to third party (source – watchdog Cert). “It has been reported that personal data of Facebook and Twitter users were improperly accessed by a pair of malicious SDKs used in certain third-party apps,” Cert-in said in the advisory note on November 27.
….Read Detailed Analysis 


>> Read detailed analysis and blog here
Read more…

700K Amex Customer Data Exposed: What You Need To Know

A recently disclosed data leak impacts around 700,000 AmEx India customers, exposing Personally Identifiable Information (PII) like Names, Emails & Telephone numbers. This leak highlights the perils of Shadow IT, and why organizations should look into building a continuous digital risk monitoring program. Here’s a brief on what you need to know:

What Was Exposed?

An unprotected MongoDB instance, containing nearly 3 Million records, of which roughly 700,00 were unencrypted, containing PII like Name, Email, Phone numbers etc.

As per Bob Diachenko, from Hacken, who discovered the leak on 23rd October : “Files hosted on the AmEx India website (links to which were also included in the exposed database) contained detailed unencrypted information on hundreds of thousands of AmEx customers, incl. names, mobile phones, and PANcard numbers.”

Probable Cause:

Lax security practices by one of Amex’s vendors handling SEO or Lead Generation was highlighted as probable cause by Bob, who mentions: “Upon closer examination, I am inclined to believe that the database was not managed by AmEx itself but instead by one their subcontractors who were responsible for SEO or lead generation. I came to this conclusion since many of the entries contained fields such as ‘campaignID’, ‘prequalstatus’ and ‘leadID’ etc.” . The vendor remains unidentified so far.

How Was it Discovered?

The leak was discovered using publicly accessible IoT search engines like Shodan and BinaryEdge. Based on queries on the IoT search engines, Bob was able to identify exposed MongoDB server running on public IP, containing data which appeared to belong to Amex, and was later confirmed through manual analysis. The data was indexed at least 5 days prior to discovery.

Similar Data Leaks in the Past:

Misconfigured, publicly accessible IT infrastructure leaking sensitive data has become a common occurrence, and has led to a number of leaks in the past, including ones impacting Verizon Wireless, Booz Allen, Accenture etc. This infrastructure is often referred to as “Shadow IT”, i.e. IT infrastructure which might not be in IT’s radar, due to various reasons (e.g.: Marketing applications put up online without informing IT). Shadow IT infrastructure often also includes misconfigured cloud infrastructure which organizations might be using (e.g.: S3 Buckets), and may be managed by organization’s vendors (like in the case of Amex).

What Can Organizations Do About It?

Get a Complete Understanding of Organizations Digital Attack Surface: Most organizations do not have a complete view of their digital attack surface. Common gaps include an incomplete list of domains, subdomains, Server / IPs, IoT, 3rd Party Services etc. A single unsecured server can lead to a catastrophic breach.

Continuously Monitor for Digital Risks: Digital assets go online and offline on a continuous basis. Digital assets need to be continuously monitored to minimize window of exposure. In the era of DevOps, organization should have complete visibility on a near real-time basis on what assets are getting exposed.

Include Vendors as Part of Digital Risk Monitoring: Organizations often neglect vendors from the purview of security monitoring, often relying on questionnaire-based assessments, which is grossly insufficient. Progressive organizations are leveraging OSINT (Open Source Intelligence) to monitor their vendors, and minimize the risks.

Reference: https://blog.hackenproof.com/industry-news/inside-american-express-india-storage-exposure/

Product Comparison Platform is the new way to define and secure organizations’ perimeters

Product Comparison Platform indexes the entire global internet to discover the unknown attack surface of an organization which is exposed on the internet. It creates an asset inventory of all your publicly exposed applications & services. This big picture is delivered via web-based software, APIs, and executive reporting.

Read more…

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for firewall vendors, users and practitioners to innovate, educate and discuss around the current security landscape.


A Next-Generation Firewall (NGFW) is an integrated network platform that combines a traditional firewall with application specific granular controls to help them detect application specific attacks. They help detect attacks through application specific protocols such as HTTP, HTTPS, SMTP and so on. It also incorporates various network device filtering functionalities such as an intrusion prevention system (IPS), Web filtering and Email security.

 

Here are top 6 vendors to watch out for in NGFW market :

 

Palo Alto

Palo Alto Networks next-generation firewalls are all based on a consistent Single-Pass Architecture. Palo Alto integration with GlobalProtect mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures).

 

To Know More: Visit Palo Alto Networks NGFW Product Page

 

Fortinet

The FortiGate next gen firewall is a high-performance network security appliance that adds intrusion prevention, application control, and anti-malware to the traditional firewall-VPN combination. This NGFW provides one platform for end-to-end security across your entire network.

 

To Know More: Visit Fortinet NGFW Product Page

 

Checkpoint

Check Point’s enterprise firewall product line includes 17 appliances and two chassis for hardware blades, scaling up to 400 Gbps. It can also be delivered as a virtual appliance, deployed on VMware, Amazon Web Services (AWS), OpenStack and Microsoft Azure, or delivered as software.

 

To Know More: Visit Check Point NGFW Product Page

 

(Read More: 9 Top Features To Look For In Next Generation Firewall (NGFW))

 

CISCO

Cisco Firepower NGFW appliances combine network firewall with next-gen IPS and advanced malware protection for better security and visibilty.

 

To Know More: Visit Cisco ASA Firewall Product Page

 

Juniper technologies

Juniper next-generation firewalls use information from Juniper’s Sky Advanced Threat Protection cloud-based service and third-party GeoIP feeds to block malicious activities as they enter or traverse the network. It also provide application visibility and control, IPS and user-based application policies, plus unified threat management (UTM) to protect and control your business assets.

 

To Know More: Visit Juniper Networks NGFW Product Page

 

Forcepoint

Forcepoint Stonesoft NGFW provides centralizing monitoring, management and reporting across diverse virtual, physical and Cloud environments, as well as third-party devices. Optimized workflows streamline daily administrative tasks and security management for high efficiency and low total cost of ownership (TCO)

 

To Know More: Visit Forcepoint Stonesoft NGFW Product Page

Read more…

This article delves into the risk Shadow IT poses. In a recent report Gartner predicted 30% of breaches due to Shadow IT, this further brings the focus to this topic. Let’s take a look at the report and a few mitigation strategies

1.What Gartner Predicted About Shadow IT

Gartner’s Top Security Predictions in 2016 predicted ‘By 2020, a third of successful attacks experienced by enterprises will be on their shadow IT resources.’. Details of the report may be foundhere (which predicts 30% breaches due to Shadow IT)

Shadow IT brings forward all that remains in the shadow. And that has plenty of sensitive data on it. Shadow IT lets unauthorized parties access sensitive data. Thus, it is easy to see what threats Shadow IT brings. You can’t protect what you don’t know exists. That needs us to enable programs to get that kind of information and take mitigation steps to control it.

2. Why Breaches Shall Increase Due To Shadow IT?

It’s the part where sensitive data can be found without much effort and it also has no security as the organizations are unaware of its existence. Hackers find Shadow IT an easy target due to reason like –

  • Shadow IT Weakens Organizational Standards
  • Shadow IT Could Let Unauthorized Parties See Confidential Files

3. How To Manage Your Shadow IT Risk?

Mitigation can be hard but the first step is to discover your Shadow IT data. Then comes mitigation.

Here’s some advice from the CSA community. Reference links are provided below

  • Ask
    Ask employees which services they are using, the IT must take measures and have policies to contain threats. You might also need to utilize a combination of automated and manual discovery tools to get a complete picture of what programs employees are using and not using. The IT needs to get a full overview of all services being used to be able to protect.
  • Protect Your Data
    Implement automatic backup of all endpoint data in the enterprise to capture a real-time view of where employee data lives, when and where it moves and who has touched it—even as it moves to and from non-approved clouds.
  • Act Fast When The Inevitable Happens
    The reality is a breach may be inevitable, but you can recover. With continuous and automatic endpoint backup, IT can quickly evaluate the content of files believed to have been breached and act in good faith to lessen the impact.

Reference:

https://www.gartner.com/binaries/content/assets/events/keywords/data-center/dci5/gartner-predicts-for-it-infrastructure-and-operations.pdf

https://blog.cloudsecurityalliance.org/2015/10/14/managing-shadow-it/

Read more…

round table ciso

We were happy to participate in a community round table organized by CISO Platform

Key Discussion Points : 

  • What is Shadow IT?
  • What are the types of Shadow IT?
  • Practical demo using open source tools
  • Controls to manage shadow IT risk

Reason Of Risk : 

  • No standardization
  • Unknown risks
  • Security breaches
  • Data leaks

Types Of Risks :

  • Third party email service
  • Third party applications – whatspp, box
  • Unknown assets
  • Custom applications / individual built applications / scripts
  • Database
  • Cloud Buckets, S3
  • Github ..online code repository
  • Online Free tools / SaaS
  • API
  • Owner change of assets (person has left)
  • Data in non electronical/ Physical forms
  • Shadow accounts/privileges
  • Shared / Leaked / Default / Weak / Written down passwords
  • Backdoors
  • IoT
  • Rogue devices
  • BYOD
  • CCTV – source and data destination; set-top box
  • 3rd party
  • 4th party
  • Supply chain

READ MORE >> Recommendation to Prevent Shadow IT

Read more…

Credential stuffing is a method that hackers use to infiltrate a company’s system by automated injection of breached username & password pairs. Attackers use credentials to bypass anti-spam and firewall devices and access users accounts. Once they were inside the company network, they can send phishing emails or compromise company systems/data. Note that attackers just need to gain access to only a few accounts, or just one admin account to compromise the system. According to OWASP report, these Attackers/hackers do money laundering, social security fraud, and identity theft, or disclose legally protected highly sensitive information.

Situation of Breached Credentials:

Usage of stolen credentials is reported as #1 reason in 2018 Verizon Data Breach Investigations Report with being the cause of 22% of all breaches in 2017. 6 out of 10 confirmed data breaches in 2016 leveraged weak or stolen passwords.

Simple Steps to Prevent Password Breaches:

  • Use 2-Factor Authentication
  • Change passwords at least in three months
  • Create awareness among employees
    • Ask employees to not use company credentials for their personal accounts (social media, online purchasing etc.). Research shows that nearly 75% of people are still using duplicate passwords across multiple systems
    • To Use different passwords for different purposes like business, personal and banking
  • Monitoring continuously of the cyber data leaks

We can see credential stuffing in OWASP – 2017 – Top 10 critical web application security risks report under the second most critical risk: Broken Authentication. According to OWASP – 2017 report, Attackers/hackers do money laundering, social security fraud, and identity theft, or disclose legally protected highly sensitive information.

Some High-Profile Breaches Caused: 

LinkedIn Breach in 2012:

LinkedIn, the Social Networking Website was hacked in 2012 by Russian cyber criminals and they hacked around 65M user accounts & passwords. They posted the stolen credentials on a Russian forum, the next day after the LinkedIn was breached. Also in 2016, they found out that 100M email addresses and hashed passwords are claimed as an additional data along with breached credentials in 2012. LinkedIn was not sure whether the hackers were also able to steal email IDs associated with the compromised user accounts.

Adobe Breach:

Adobe was hacked in October 2013, where the attackers had gotten access to IDs and encrypted passwords of 38 Million active users. After many weeks of research, adobe found out that the hacker had exposed customers IDs, Names, Passwords and Debit/Credit Card information.

Home Depot:

Home Depot’s POS systems had been infected with Malware, which posed as Anti-Virus Software. Home Depot agreed to pay a minimum of 19.5 Million dollars to compensate. The settlement covered about 40M people, whose payment card data was stolen.

Summary:

Breached Credentials cause a lot of damage every year to many companies. Continuous Monitoring is also required along with the above-mentioned preventive methods.

Reference:

https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html

https://en.wikipedia.org/wiki/List_of_data_breaches

Read more…

Analysing/Dissecting Uber Subdomain Takeover Attack

Subdomain Takeover is a type of vulnerability which appears when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Bitbucket, Desk, Squarespace, Shopify, etc) but the service is no longer utilized or has been migrated/deleted. In this blog, we will be dissecting Uber Subdomain takeover vulnerability which was further escalated to authentication bypass of all ube subdomains.

For example, if subdomain.abc.com was pointing to a GitHub/Heroku/Desk page and the user decided to delete their GitHub/Heroku/Desk page, an attacker can now create a GitHub/Heroku/Desk page, add a CNAME file containing subdomain.abc.com, and claim subdomain.abc.com..

There has been quite a few instances when uber has faced the subdomain takeover attacks.

Some Instances Of Subdomain TakeOver

1- Subdomain takeover on rider.uber.com due to non-existent distribution on Cloudfront

Reported by :Frans Rosén (fransrosen)

Disclosed publicly on : December 13, 2016 5:18am +0530

To Know More : Click Here

2 – Authentication bypass on auth.uber.com via subdomain takeover of saostatic.uber.com

Reported by: Arne Swinnen (arneswinnen)

Disclosed publicly on : July 13, 2017 6:13am +0530

To Know More : Click Here

We will be analysing “Authentication bypass on auth.uber.com via subdomain takeover of saostatic.uber.com” here.

According to Security researcher Arne Swinnen, Uber was vulnerable to subdomain takeover attack on their subdomain saostatic.uber.com via Amazon CloudFront CDN. Also, Uber has deployed Single Sign-On system (SSO) at auth.uber.com, which was based on shared cookies between all *.uber.com subdomains, and was vulnerable to session cookie theft by any compromised *.uber.com subdomain.

Therefore, the impact of the subdomain takeover could be increased to Authentication Bypass of Uber’s SSO system, causing access to all *.uber.com subdomains protected by it (e.g. riders.uber.com, vault.uber.com, partners.uber.com, etc).

Subdomain Takeover

Subdomain Takeover is a type of vulnerability which appears when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Bitbucket, Desk, Squarespace, Shopify, etc) but the service is no longer utilized ( i.e. has been deleted or migrated).

For example, if subdomain.abc.com was pointing to a GitHub/Heroku/Desk page and the user decided to delete their GitHub/Heroku/Desk page, an attacker can now create a GitHub/Heroku/Desk page, add a CNAME file containing subdomain.abc.com, and claim subdomain.abc.com.

In Uber’s case, Subdomain saostatic.uber.com was pointing to Amazon Cloudfront CDN via a DNS CNAME.1.png

However, the hostname “saostatic.uber.com” was not claimed by anymore on Cloudfront, resulting in a Cloudfront error page when visiting the subdomain before the takeover. 

So, a new Amazon Cloudfront CDN endpoint was created and linked to an attacker-controlled origin server.

For the new Cloudfront CDN endpoint, “saostatic.uber.com” was designated as hostname successfully. This allowed to fully takeover this domain. As you can see in below snapshot that “saostatic.uber.com” is showing the content hosted by Arne Swinnen, who has hijacked this subdomain and reported to Uber responsibly.

Reference:

https://www.arneswinnen.net/2017/06/authentication-bypass-on-ubers-sso-via-subdomain-takeover/

https://www.zdnet.com/article/uber-patches-security-flaw-leading-to-subdomain-takeover/

READ MORE >>  Risks of Shadow IT in Financial Services Firms

Read more…

Top 4 Best Practices To Manage Shadow IT

Here is a small list of the major policies and best practices to manage Shadow IT

Policies To Have

1.Have A Shadow IT Policy

Create a policy document that takes care of the major areas of Shadow IT Management. This will make sure all company assets and services get registered on a single repository from and all major data sharing gets accounted for including an organization’s subdomain, third-party services etc.

2. Use IT Department As A Service-Delivery Organization

Associating every major activity through the IT increases the chances of proper use of the IT infrastructure, mostly making sure major activities are logged. This has certain dependencies on the IT policy of course

3.Guideline For IT Budgeting & Procurement

This is one of the major areas that the policies must take care of. This will allow for all major services being logged and thus the data shared gets logged and gets stopped from becoming Shadow IT

4.Guideline For IT System Consolidation

The IT infrastructure should be very well documented as this allows for the data capture and lose points. The policies must be coherent with the same.

What Not To Do

Practice #1: Use Of Substandard Development Techniques

Shadow application development needs one to have a decent understanding of software architecture, secure programming guidelines etc. Often managers of non-technical background do not have this in place causing sensitive data to be mishandled

Practice #2: Over-Reliance on Shadow Cloud Provider Security

Often times it may be assumed the cloud provider will handle the security needs. The extent of this expectation needs verification. Proper implementation of the security features could make a huge difference.

Practice #3: Unsecured Shadow File Storage / Mobility

How and where files or sensitive data may be stored must be well understood and implemented in the organization. This will mean the organization can track and maintain the logs of the registered data sources. In case of absence of this, on an occurrence of the breach, it is very hard to understand what all got compromised, since there may exist untracked data sources. BYOD could also be such a use case where it increases the efficiency of the worker but adds security issues.

Practice #4: Use of Pre-Hacked Shadow IT Drives

An example of this could be an attack like ‘Bad USB’. In this, the USB firmware (the part that controls the action of the USB when connected) could get administrator rights and pass on data from the endpoint it is connected to. This is hard to identify as the malware-scanning software do not detect it. Thus a compromised hardware could make things very dangerous.

Reference :

http://www.isaca.org/About-ISACA/Press-room/News-Releases/2017/Pages/ISACA-Shares-Eight-Controls-to-Help-Manage-Shadow-IT-and-Optimize-Its-Benefits.aspx

https://www.travelers.com/business-insights/industries/technology/5-shadow-IT-practices-that-put-tech-companies-at-risk

https://www.servercentral.com/managing-shadow-it-risks/

https://www.cio.com/article/2380960/byod/6-tips-to-help-cios-manage-shadow-it.html

Read more…

3 Ways to Manage Enterprise Shadow IT

Gartner predicted that shadow IT is 30 to 40 percent of IT spending in large enterprises, and Everest Group predicted that it can be 50 percent or more of IT Spending. This indicates that a lot of IT spendings are being bypassed to IT department. How to manage enterprise Shadow IT has become a big concern for a lot of organisations.

Because of rapid growth in SaaS and cloud products/services used by enterprises, shadow IT now can operate securely at scale. So now the concern is how can a CIO address the risks and expenses of shadow IT?

To eliminate/manage the problem of Shadow IT, let’s start with the root cause of the Shadow IT problem. The main reason for Shadow IT is that Enterprise IT is not fast enough to respond to the IT needs of businesses. So, the local departments start building their own functionalities and capabilities by buying IT hardware/software/services causing shadow IT. To overcome this problem, CIOs must make sure that their IT group needs to perform better than shadow IT.

1 – By Establishing a DevOps cross-functional team

Devops team would aligns to the business needs instead of IT functions of an enterprise. A small, cross-functional team with a deep understanding of business and can deliver functionalities required by business at speed by either by using SaaS and/or doing integration and development.

It was interesting that the companies who have DevOps teams into their operations, have seen greater improvements in business impact, speed and worker productivity that completely out-compete shadow IT and shared services.

Silicon Valley and other startup communities are great examples of how to deal with this issue of Shadow IT. They develop functionality at speed through DevOps pods to overcome Shadow IT issues.

2- By Centralising the Procurement Methodology of Organisation

Using centralized procurement , businesses can decrease Shadow IT costs tremendously. A central system will provide IT managers with timely IT infrastructure (Hardwares, Domains, Subdomains, IPs, Applications etc.), and allow the CIO to advance goals of the overall business requirements.

3 ways a centralized procurement methodology helps defeat Shadow IT:

  • Departmental IT Infrastructure (Hardware, Domains, Subdomains, IPs, Applications etc.) needs to be aligned with Strategic Infrastructure Planning
  • High-Performing Global Enterprise Network Building
  • Overall IT Infrastructure (Hardware, Domains, Subdomains, IPs, Applications etc.) expenditure decrease

3- Unshadow the Shadow IT

Whatever you do, there are always good chances of having Shadow IT . So, what if we can unshadow the Shadow IT. This can be done via monitoring your digital attack surface, and find out the Shadow IT infrastructure.

This monitoring their Shadow IT helps enterprises to reduce the risk of security vulnerability to a greater extent.

Reference:

https://www.cio.com/article/3188726/it-industry/how-to-eliminate-enterprise-shadow-it.html

http://www.fgx.com/how-to-eliminate-shadow-it/

Read more…

Gartner’s Top 3 Articles On Shadow IT

Gartner predicted 30% breaches due to Shadow IT by 2020. This is just one part of how critical this risk area is for the enterprise space. We have put together some of the top resources from Gartner on Shadow IT along with the links to the detailed reports and articles. This will help you get a quick run through the top resources from Gartner on Shadow IT. Here are some top resources on Shadow IT from Gartner we found on the internet. 

 

    • Make The Best Of Shadow IT This article gives 4 quick tips to help make the best of Shadow IT. It includes building a deep network of business contacts, offer generalized help to business-led projects, integration issues early between IT and the business, open community of practice for all PMs so that you have some influence and more. Read more here
    • Don’t Let Shadow IT Put Your Business At Risk “Most organizations grossly underestimate the number of shadow IT applications already in use,” says Lowans. This gives us an idea of the risk. This article deals with the various aspects of shadow IT in the cloud. This article includes tips on Data Security Governance, Data Protection Tools, Security Policies & more. Read more here
    • Gartner 7 Top Security Predictions For 2017 This article has top 7 major predictions in security by Gartner. A major one being 33% of security breaches is predicted to happen due to Shadow IT by 2020. It’s an interesting read apart from the Shadow IT aspect. It includes predictions like how AI, automation, and cloud visibility will shape the future of IT security, by 2020 investment in artificial intelligence/machine learning-based tools for IT resilience orchestration automation will more than triple, helping reduce business outages from cascading IT failures & many more. Read more here

 

Reference

https://www.gartner.com/smarterwithgartner/make-the-best-of-shadow-it/

https://www.gartner.com/smarterwithgartner/dont-let-shadow-it-put-your-business-at-risk/

https://www.gartner.com/smarterwithgartner/7-top-security-predictions-for-2017/

https://www.gartner.com/smarterwithgartner/make-the-best-of-shadow-it/

Read more…

Risks of Shadow IT in Financial Services Firms

Organizations across all Financial Services firms are dealing with the effects of shadow IT, whether they realize it or not. Shadow IT is technology that is adopted and deployed by business units without the knowledge or consent of corporate IT teams.

The motivations behind the adoption of shadow IT are typically well-intentioned. For financial services firms, the risks of shadow IT are amplified due to the value of the data their organizations possess, and the strict regulatory standards with which they must comply. As the shadow IT adoption continues to grow, financial services firms have to be aware of the risks associated with it, as well as ways to mitigate its risks without impacting network performance.

Data Loss and Inconsistent Data

Two of the primary risks associated with shadow IT

  • Data loss
  • The proliferation of outdated data

When creating a strong cybersecurity program, it is important to know what data you have, and where that data is stored. Shadow IT can make it difficult to determine where data is being stored. This makes it impossible to ensure that this data is being secured in accordance with organizational and industry standards. Additionally, not only do IT teams not know what data is being stored in these separate applications, the data that is there may not be updated as frequently as data stored in corporate databases.

Compliance:

The lack of security features in many Shadow IT applications put financial services firms at risk for being out of compliance with the many regulatory standards governing the industry. As IT teams add controls to their data processing and storage practices to account for regulations, shadow IT undermines these efforts. Data stored in insecure applications without encryption are at a higher risk of being hacked, with potentially huge consequences.

Final Thoughts:

Shadow IT continues to pose a serious risk to enterprises and has proven difficult to control. For financial service Organisations, this unmanaged IT could have major consequences for security, compliance, and operations.

READ MORE >>  3 Ways to Manage Enterprise Shadow IT

Read more…

As the name suggest “Digital Footprint”, it’s the unique traces of your digital presence. As per wikipedia, “ Digital Footprint refers to one’s unique set of traceable digital activities, actions, contributions and communications that are manifested on the Internet or on digital devices.” Here in this blog we will emphasise on how to manage enterprise digital footprint.

An Enterprise Digital Footprint, is an inventory of all the digital assets over internet (web, mobile, individual, social etc) related to an enterprise. In other words, it represent the unique traces of its digital presence like domains, subdomains, IPs, Applications, etc shared over internet intentionally or unintentionally.

We can divide Enterprise digital footprints in 2 categories same as individual digital footprint:

1- Active Digital Footprints: When personal data is released intentionally  (Like in Social Media Pages, known Domains, Subdomains, IPs, Applications etc) – Known Unknowns

2- Passive Digital Footprints: When personal data is collected without owner’s knowledge i.e. shared unintentionally. For example, Local departments like marketing launching a website , cloud/SaaS app bypassing IT and security teams causing no official record of this digital asset or IT puts some application online and forget it to shut it down – Unknown Unknowns

Why Managing Digital Footprint Is Important?

Organisations in digital age are competing based on their technology innovation and how fast are they adopting these new technologies. However, this business need of faster technology adoption causes departments to bypass IT and security teams while launching new application, buying new domains, subdomains etc. or they launched some application but forget it to put it offline, Which in turns exposes the digital attack surface with softer targets for attackers/hackers.

For large enterprise, the unknown digital assets are in hundreds or thousands, can easily find out by novice hackers as well. They have easy way go in and out since not monitored. So, it’s important to know what an attacker can see about your organisation i.e. how you look from outside.

You can’t protect what you don’t even know. So, once you have the inventory of you enterprise digital footprint. Now you can prioritise your Digital Assets. After prioritisation, you take actions to make sure that your all of your external digital assets are secured.

4 Steps To Manage Your Enterprise Footprints:

  1. Discover Enterprise Digital Footprints
  2. Create an Inventory of all your external Digital Assets
  3. Prioritise the digital assets to take actions required to secure digital attack surface
  4. Monitor Enterprise Digital Footprints Continuously

FireShadows Digital Foot-printing and Shadow IT Discovery Platform can help organisations discover and map the digital assets which are exposed to internet intentionally or unintentionally. Once you have the inventory of digital assets, Platform helps you to monitor the digital assets as per your business needs. Also with the differential reporting features, You will be notified once some new digital asset is exposed to internet.

Read more…

4 Ways To Manage Enterprise Digital Footprint

As the name suggest “Digital Footprint”, it’s the unique traces of your digital presence. As per wikipedia, “ Digital Footprint refers to one’s unique set of traceable digital activities, actions, contributions and communications that are manifested on the Internet or on digital devices.” Here in this blog we will emphasise on how to manage enterprise digital footprint.

An Enterprise Digital Footprint, is an inventory of all the digital assets over internet (web, mobile, individual, social etc) related to an enterprise. In other words, it represent the unique traces of its digital presence like domains, subdomains, IPs, Applications, etc shared over internet intentionally or unintentionally.

We can divide Enterprise digital footprints in 2 categories same as individual digital footprint:

1- Active Digital Footprints: When personal data is released intentionally  (Like in Social Media Pages, known Domains, Subdomains, IPs, Applications etc) – Known Unknowns

2- Passive Digital Footprints: When personal data is collected without owner’s knowledge i.e. shared unintentionally. For example, Local departments like marketing launching a website , cloud/SaaS app bypassing IT and security teams causing no official record of this digital asset or IT puts some application online and forget it to shut it down – Unknown Unknowns

Why Managing Digital Footprint Is Important?

Organisations in digital age are competing based on their technology innovation and how fast are they adopting these new technologies. However, this business need of faster technology adoption causes departments to bypass IT and security teams while launching new application, buying new domains, subdomains etc. or they launched some application but forget it to put it offline, Which in turns exposes the digital attack surface with softer targets for attackers/hackers.

For large enterprise, the unknown digital assets are in hundreds or thousands, can easily find out by novice hackers as well. They have easy way go in and out since not monitored. So, it’s important to know what an attacker can see about your organisation i.e. how you look from outside.

You can’t protect what you don’t even know. So, once you have the inventory of you enterprise digital footprint. Now you can prioritise your Digital Assets. After prioritisation, you take actions to make sure that your all of your external digital assets are secured.

4 Steps To Manage Your Enterprise Footprints:

  1. Discover Enterprise Digital Footprints
  2. Create an Inventory of all your external Digital Assets
  3. Prioritise the digital assets to take actions required to secure digital attack surface
  4. Monitor Enterprise Digital Footprints Continuously

FireShadows Digital Foot-printing and Shadow IT Discovery Platform can help organisations discover and map the digital assets which are exposed to internet intentionally or unintentionally. Once you have the inventory of digital assets, Platform helps you to monitor the digital assets as per your business needs. Also with the differential reporting features, You will be notified once some new digital asset is exposed to internet.

Read more…

Many organizations have hundreds of vendors and Third-Party risk exposure is one of the biggest threats. Most organizations depend upon partners, vendors, suppliers, contractors and other third parties for day-to-day operations. Each of them presents some potential risk to the organization.

Third-Party Risk Management programs help in assessing the cybersecurity of vendors/3rd parties that handle an organization’s sensitive data or have access to internal IT systems. The main tools used for Third-Party/Vendor Risk Management are

  • Questionnaires method
  • Vulnerability Assessments

But these programs miss the key component of effective Third-Party risk management, which is continuous monitoring. Without continuous monitoring, the organization’s sensitive data is still at risk and the internal IT systems might be more at risk which you may not realize.

Here are the reasons why you should consider continuous monitoring for Third-Party risk management:

1. Why Continuous Monitoring is required?

Cyber attacks through third parties have become more common, IT teams started concentrated on cybersecurity of their vendors. Continuous third-party monitoring helps in the improvement of event identification time, event remediation time, response time to events, in comparing security postures among vendors/3rd parties, industry-specific technology trends.

2. Questionnaire Methods/ Point-In-Time Assessments Are Ineffective:

There are many third-Party risk management tools like questionnaire methods, Vulnerability assessments, penetration tests. But these assessments are done at a single point of time and reflects the cybersecurity posture at that time. Cyber attacks can happen any day and without continuous monitoring, threats and vulnerabilities could not be found out immediately. Continuous monitoring will help the organizations to identify the possible threats and recover based on the technologies implemented. Questionnaire driven approach is flawed since vendors’ answers may not represent the reality and conducting a comprehensive audit is time-intensive and costly and is infeasible to conduct regularly.

FireCompass continuously monitors, analyses and provides alerts on any changes or risks associated. Also, its dashboard gives the opportunity to organization to choose their best vendors based on security score to continue their partnership.

3. Continuous Monitoring Is Necessary:

Continuous Monitoring of vendor risk is necessary for competitive organizations as Data Breaches are becoming common and all it takes is one weakness (risk) from a vendor that would give away sensitive information/data. Public and consumers expect that the organizations will make efforts to protect the data. If your organization experienced a breach caused by a third party then the fact is that consumers probably were not caring whether their information was accessed via your systems or some vendors.

>>See For Yourself (Free Trial): Continuous Recon & Monitoring

Summary:

Continuous Monitoring reduces data breaches, increases accountability. 

Reference:

https://www.firecompass.com/recon-and-attack-platform-firecompass/

https://www.pericertum.com/solutions/third-party-risk-scoring/

Read more…