End Point Protection For Dummies
End Point Protection For Dummies
End Point Protection For Dummies
Endpoint Detection
and Response
Tripwire Special Edition
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Publishers Acknowledgments
Were proud of this book and of the people who worked on it. For details on how to
create a custom For Dummies book for your business or organization, contact info
@dummies.biz or visit www.wiley.com/go/custompub. For details on licensing the
For Dummies brand for products or services, contact BrandedRights&Licenses@
Wiley.com.
Some of the people who helped bring this book to market include the following:
Project Editor: Martin V. Minner
Acquisitions Editor: Amy Fandrei
Editorial Manager: Rev Mengle
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter1
Understanding Endpoints
In This Chapter
Surveying the threat landscape is supposed to be scary!
Extending and stretching the definition of endpoint
Changing the concept of endpoint so we can adapt and evolve
Understanding EDR and what it does
or many IT and security professionals, a common definition for endpoint is something like anything with a
eyboard.
k
But in an increasingly digital and mobile connected world,
with scads of devices seeking access to organizational networks, applications, and data, that definition doesnt include
the security threat from the full range of employeeowned
devices, virtual machines, point-of-sale terminals, IoT devices,
and even servers and industrial systems.
But before we dig into endpoints in detail, lets get a sense of
how scary the world outside the organizational boundary can
be. Cybersecurity pros call this the wild, where boogeymen
and monsters constitute the threat landscape.
Here Be Dragons!
Ever since computing got going in the 1940s and 1950s, systems
have been subject to threats. Although they can come from bad
guys, its important to understand that simple mistakes from
wellintentioned people pose threats, too. As business uses for
computing have evolved, the threats that organizations face
have evolved as well.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A threat tsunami
In an alltootypical cycle, as computers and networks have
evolved to improve security and productivity, threats have
evolved right along with them. Because they can get access
to just about anything, insiders also pose a big threat to organizations (possibly the biggest, according to the FBI and the
National CyberForensics and Training Alliance, aka NCFTA).
Suffice it to say there is an everincreasing array of threats on
the landscape, many of which bring serious risks to organizations economic health and wellbeing.
In April 2015, CNN Money reported that about 1 million new
malware threats were appearing daily, based on reports
from security teams at Symantec and Verizon. The number
of threats with which organizations must cope is a veritable
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
t sunami. It often seems that thieves work faster than companies can react, launching an everincreasing number of probes
and attacks against organizations of all kinds.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Managing security for these devices or things is an increasingly important concern, a huge emerging business issue
(analysts speak of tens to hundreds of billions of such devices
online by 2020), and a giant potential headache for IT.
A convergence of operation technology and information
technology systems and networks is underway in many large
industrial and infrastructure organizations. This digital transformation requires that we also include OT devices in the
definition of endpoint.
Figure11 introduces a hierarchy for devices typically found
on organizational networks. The order of the pyramid reflects
both the business value of the assets involved and their
overall counts (with one possible exception). Where counts
are concerned, there are invariably more end-user devices
than anything else amid the endpoints, with relatively fewer
network devices and business-critical endpoints. Although
the number of critical high-value systems such as servers
and cloud assets is small, the number of OT items is somewhat open; it may simply reflect the consoles and servers
that aggregate sensors and devices, or the sum total of such
devices plus consoles.
10
Endpoint Detection
and Response
In reality, an endpoint is any system worth protecting. If such
a system is compromised, it can inflict a negative monetary or
operational impact on an organization, and thats the reason
to protect it. Examples of such systems include Internetfacing
web properties (which may be used to conduct business,
to establish an online presence, and/or as communications
hubs), trading systems, SCADA systems, payment processing
systems, and national defense or POS infrastructures.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
11
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
12
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter2
Protecting Endpoints
In This Chapter
Discovering, inventorying, and monitoring endpoints
Closing cyberthreat gaps
Dealing with detection and response
Automating threat protection: Can it work?
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
14
15
Device hardening is another kind of protection in which endpoint devices are constantly updated and managed to keep
them secure against known configuration weaknesses.
Protection also requires monitoring security intelligence
sources to understand emerging threats that affect systems,
software, and services related to the organizations endpoints.
Organizations must learn about necessary remediations as
soon as they become available, and learn how to recognize
and respond to threats whenever they might appear.
EDR systems can use small, lightweight programs called agents
that run on each endpoint in the form of an application, an
app, or even a kernellevel addin on devices that may not support applications or apps directly. An agent provides deep and
realtime monitoring, analysis, and response. In some cases, a
remote or agentless approach is used for discovery and less
intrusive monitoring and response when an agent is not feasible, acceptable, or requires longer deployment cycles.
Remember, your endpoints can be located on the enterprise
network, in the data center, or in the cloud. They can include
a broad range of systems such as Windows desktops and servers, OS X, AIX, HPUX, CentOS, Debian, Oracle Linux, RHEL,
SUSE, Solaris, Amazon Web Services, and Azure deployments.
16
17
Policy violations: System changes (for example, scheduled maintenance or upgrades, new software installs,
new users, or account changes) outside approved configuration windows may indicate a threat actor at work.
It is critical to identify successful attacks as soon as possible
after they occur. A good EDR system catches them as they
start to unfold, identifies them automatically, and helps take
immediate response action. The shorter the period in which
attacks are active, the less damage they can cause.
on two systems in a tenserver cluster by looking at the system state history. The patch was redeployed and
the error disappeared!
Case study 3: A developer and publisher of innovative games used
Tripwires EDR solution to detect an
attack on its web servers. Reports
showed that files had been created,
the owner ID, what the files contained,
and the time they were created. The
company immediately isolated those
files and baselined everything on the
system to contain the damage. The
company found the malware and
quickly deployed patches without
having to take its servers offline. The
response took hours not days or
weeks between detection and
eradication of malware on their systems. Meanwhile, security headlines
continued to reveal names of other
compromised organizations, but not
this company.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
18
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
20
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
21
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
22
RealTime Response
Realtime response means an ability to detect and respond
to threats as they appear. An ideal response is fast enough to
prevent any threat from establishing itself on organizational
networks or having an impact on organizational assets. The
next two sections explore the means to this important security goal for endpoints in particular, and infrastructures in
general.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
23
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
24
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4
Security Maturity
Is in Your Futurity
In This Chapter
Collaborating between security and IT operations
Creating synergy with compliance and security frameworks
Assessing security maturity
Table 4-1
Level
Characteristics
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
26
Characteristics
2 Repeatable
3 Defined
4 Measured
5 Optimized
Source: Assess Your Security Program with Forresters Information Security Maturity
Model, Forrester Research, Inc., November 2, 2015.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
27
28
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
29
NIST has also created a cybersecurity framework that likewise identifies an organizations current security state, and
describes ways to boost maturity (and security posture).
For details, see http://bit.ly/NISTCyberSecFramework
(PDF file). Other commonly used security frameworks include
the ISO 27000series, IEC 62443, FFIEC Information Security,
and COBIT.
30
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
32
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
33
Baselining Endpoints
A good EDR implementation requires that we quickly identify
new endpoints as they appear on an organizations networks.
Such systems generally make an inventory of whats installed
on each endpoint device including some or all of the following: firmware, operating system, applications, and communication software, along with the versions and updates or
patches applied to these various components.
Normally, an EDR system requires an endpoint to meet
security requirements regarding software and firmware in
accordance with the security policy and issues an alert on
any unauthorized access, violation, or change of configuration. At the same time, the EDR system may alter or add to an
endpoints configuration to make sure that proper controls
are in place for safe use and secure communications.
Some advanced EDR systems also install an agent, a lightweight software program that allows the EDR system itself to
access the endpoint, monitor its activity and configuration,
and make changes to that configuration as and when such
changes are necessary. However, given the vast array of endpoints that need protection, alternate remote and agentless
(or mixed) deployments may be more prudent in some situations for faster timetovalue and cost optimization or for
other purely technical reasons. The key is to establish this
practice as part of your security program and to give due
consideration to the business context of the endpoints to be
secured as they fit into your security- and risk-planning goals.
Baselining is a key concept in cybersecurity. It refers to establishing a detailed sense of whats normal and safe for systems and devices to ensure a secure environment. This notion
of whats normal can be essential when monitoring systems,
because it provides something against which to compare current state, configuration, and activity, and often allows threats
to be detected by inference even when no direct evidence or
means of recognition is available or known.
Baselining endpoints establishes a point of reference for subsequent monitoring and management. Like everything else
in the security world, baselines must change when whats
normal changes. Thus, its best to think of a baseline as a
snapshot of the ideal or desired state of an endpoint, which
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
34
35
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
36
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter6
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
38
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
39
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
40
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
41
Implementing EDR
When youre ready to take delivery of an EDR solution, please
recognize that deployment to production endpoints is not the
next task to undertake. Theres some method to this madness.
To ensure the best results when EDR goes into production
use, please follow these steps:
1. Test deployment is by nature exploratory and experimental and should occur in a test lab, on a test network. You need nonproduction access to the rest of
your security infrastructure, a representative sample
of endpoints, and other equipment that is not on your
production network to begin running an EDR solution.
During this phase you learn to install, configure, and
use EDR, work with the vendors support and deployment staff to get things working, and make a first pass
at integrating with other elements of your security
infrastructure. You also begin testing threat detection
and automated response capabilities.
2. A pilot project takes results of your test deployment
out onto a carefully selected subset of the production
network, and enlists participation from willing and well
informed volunteers to try things out, see how they
work, and provide feedback. This step provides illustrations of typical user behavior, which always includes
unanticipated surprises not foreseen in the test lab.
This process is likely to repeat; one pilot project may
lead to another, or keep cycling through changes,
as you and your users converge on a customized
implementation tailored for the unique requirements of
your organization. Give this process time to work itself
out, because the better the pilot program works, the
less trouble youll have with full deployment.
3. Production deployment planning is essential before
largescale rollout. This means talking to the IT
department to find out how and when they schedule
deployment activity. Often, its once a quarter over a
holiday or long weekend. You need to understand how
deployment is specified and configured, and how you
will be expected to deliver the EDR documentation and
system. Consider how to provide access to support
staff its essential to have your own support team
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
42
Chapter7
EDR Is DiscoveryBased
For endpoint detection and response to work, all endpoints
must be discovered whenever and wherever they access the
organizations networks. The whole exercise rests on watching all active nodes, and then recognizing and managing endpoints as they seek to join in the fun. Endpoints are inspected
and cataloged (see the next item, on inventory); based on a
risk assessment and asset classification, an appropriate security policy is applied for endpoint configuration management,
monitoring, detection, and response.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
44
45
Establishing EDR
EDR works best when formal, welldocumented security
policies and training establish a securitysavvy corporate culture and guide enduser activity. Key elements of this process
also include assessing risks associated with endpoints, establishing clear, effective user policies for Internet access and
use, as well as developing and maintaining general security
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
46
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.