4 Days Left to Save $400 on SANS San Diego 2016

Reading Room

"What are your vulnerabilities? Do you even know? Take SANS survey and enter to win a $400 Amazon Gift Card. Take the survey HERE: https://www.surveymonkey.com/r/2016VulnCMSurvey

More than 75,000 unique visitors read papers in the Reading Room every month and it has become the starting point for exploration of topics ranging from SCADA to wireless security, from firewalls to intrusion detection. The SANS Reading Room features over 2,560 original computer security white papers in 99 different categories.

Latest 25 Papers Added to the Reading Room

  • Hunting with Prevention Analyst Paper
    by Dave Shackleford - August 24, 2016 

    Traditional endpoint protection such as antivirus, while effective in some cases, is no match for the ever-changing techniques that attackers use to get past defenses, according to multiple SANS surveys.


  • Building a Forensically Capable Network Infrastructure by Nik Alleyne - August 23, 2016 in Security Modeling

    The number of computer related security incidents continue to grow yearly, resulting in the need for ensuring network infrastructures are built to be forensically capable. During the period January 2011 to December 2015, the number of reported computer security incidents grew over this four-year period from 1,281 to 3,930. Similar to the increased number of reported computer security incidents, was the increased number of exposed records. During this same period, the number of exposed records jumped from 413 million to 736 million, with 2013 and 2014 having over 2 billion records exposed. Some challenges with becoming forensically capable, relates to understanding the business needs, identifying the people to support that need and ultimately the technology or tools to support business needs.


  • Automated Analysis of abuse mailbox for employees with the help of Malzoo by Niels Heijmans - August 23, 2016 in Threat Hunting

    For most companies, e-mail is still the main form of communication, both internally and with customers. Unfortunately, e-mail is also used heavily by cyber criminals in the form of spam, phishing, spear-phishing, fraud or to deliver malicious software. Employees receive these kinds of messages on a daily basis, even though strict security measures are implemented. Sometimes an employee will fall for the scam but often they will know when it is a false e-mail, especially after good awareness programs. Instead of letting them delete the e-mail, let them share it with you to learn and see what is coming through your security measures or what employees see as "fishy". But what should you do with the e-mails that are forwarded to this special "abuse" mailbox? Malzoo can be used to analyze this mailbox by picking up the e-mails, parsing them and sharing the results with the CERT team. By using the collected data, you can find new spam runs, update spam filters, receive new malware and learn in what parts of the company awareness is highest (and lowest). This paper explains the benefits and drawbacks of letting employees have a central point to report suspicious e-mail and how Malzoo can be used to automate the analysis.


  • Protect the Network from the Endpoint with the Critical Security Controls by G. W. Ray Davidson, PhD - August 22, 2016 in Network Access Control

    The endpoint is rapidly evolving and often the first vector of attack into enterprises, according to the SANS 2016 State of Endpoint Security Survey. As such, all endpoints should be considered potentially hostile.


  • Simple Approach to Access Control: Port Control and MAC Filtering by Bill Knaffl - August 22, 2016 in Network Access Control, Breaches, Critical Controls

    Many times businesses will spend time and money on "Magic Bullet" security and focus on a single technology or threat. This focus can lend itself more towards placing a "check in the box" for compliance rather than on actual security and facing today's threats. Frequently, missing controls can have a cascading effect where because one control was missing or inadequate, other failures occur turning a minor problem into a breach. This paper approaches one such incident, calls out which control was identified as the primary failure and offers an evaluation of a specific tool that could have helped prevent this attack. It covers not only the cost of the tool and the time to implement but discusses other costs such as training, monitoring, maintenance, user impact and offers a guide for a successful implementation.


  • Incident Handling Preparation: Learning Normal with the Kansa PowerShell Incident Response Framework by Jason Simsay - August 22, 2016 in Incident Handling

    Preparation is a critical step in establishing an effective incident response program. Information Security professionals that will be called upon to handle an incident must prepare ahead of time. Kansa is a PowerShell Incident Response Framework developed by Dave Hull. The PowerShell Remoting feature is leveraged to establish a highly scalable and extensible system state collection platform. Once data is collected from across the Microsoft environment, an extensive set of frequency analysis scripts may be executed to enable incident handlers to turn unknowns into knowns and to discover anomalies and indicators of compromise.


  • In but not Out: Protecting Confidentiality during Penetration Testing by Andrew Andrasik - August 22, 2016 in Penetration Testing

    In but not Out: Protecting Confidentiality during Penetration Testing Abstract:Penetration testing is imperative for organizations committed to security. However, independent penetration testers are rarely greeted with open arms when initiating an assessment. As firms implement the Critical Security Controls or the Risk Management Framework, independent penetration testing will likely become standard practice as opposed to supplemental exercises. Ethical hacking is a common tactic to view a companys network from an attackers perspective, but inviting external personnel into a network may increase risk. Penetration testers strive to gain superuser privileges wherever possible and utilize thousands of open-source tools and scripts, many of which do not originate from validated sources. Penetration testers may gain access to all compartmented sections of a network and document how to repeat successful exploits while saving restricted data to their laptops. This paper illustrates secure Tactics, Techniques, and Procedures (TTPs) to enable ethical hackers to complete their tests within scope while reducing managerial stress regarding confidentiality. A properly conducted independent penetration test should provide essential intelligence about a network without jeopardizing the confidentiality of proprietary data.


  • Filling the Gaps by Robert Smith - August 18, 2016 in Auditing & Assessment, Risk Management, Standards

    There should be an emphasis on the importance of regular internal and external auditing focusing on the business mentality of "It can't happen to me" and mitigating the risk of complacency. The key areas covered will be cementing assessments and audits as a benefit versus a reactive or troublesome activity. The cost savings from regular auditing against the alternatives such as breaches and poor publicity. The world is full of technical and administrative compliance requirements, understanding where gaps are present is not something to be afraid of, but to readily embrace and act upon those deficiencies. Thinking that you are compliant and knowing you are compliant can make a large difference in business longevity and profitability.


  • The SANS State of Cyber Threat Intelligence Survey: CTI Important and Maturing Analyst Paper
    by Dave Shackleford - August 15, 2016 in Best Practices, Threats/Vulnerabilities

    Its 2016, and the attacks (and attackers) continue to be more brazen than ever. In this threat landscape, the use of cyber threat intelligence (CTI) is becoming more important to IT security and response teams than ever before. This paper provides survey results along with advice and best practices for getting the most out of CTI.


  • Generating Hypotheses for Successful Threat Hunting by Robert M. Lee and David Bianco - August 15, 2016 in Threat Hunting, Threats/Vulnerabilities

    Threat hunting is a proactive and iterative approach to detecting threats. Although threat hunters should rely heavily on automation and machine assistance, the process itself cannot be fully automated. One of the humans key contributions to a hunt is the formulation of a hypotheses to guide the hunt. This paper explores three types of hypotheses and outlines how and when to formulate each of them.


  • Investing in Information Security: A Case Study in Community Banking by Wes Earnest - August 12, 2016 in Management & Leadership

    Small businesses, such as community banks, often do not have resources dedicated to information technology, much less resources dedicated to information security. Despite larger financial institutions having more resources to invest in information security, they are also attempting to secure much larger, more complex environments. Community banks, with a smaller footprint of computer systems and networks, have the opportunity to produce even greater results with a comparatively smaller investment. This case study shows how one small community bank enjoyed the successes of transitioning from an environment of constant reactionary troubleshooting to implementing an information security strategy that focused not only on improving the information technology environment but also business operations and regulatory compliance for the bank. First Sentence: Small businesses, such as community banks, often do not have resources dedicated to information technology, much less resources dedicated to information security.


  • Introduction to Rundeck for Secure Script Executions by John Becker - August 11, 2016 in Privilege Management

    Many organizations today support physical, virtual, and cloud-based systems across a wide range of operating systems. Providing least privilege access to systems can be a complex mesh of sudoers files, profiles, policies, and firewall rules. While configuration management tools such as Puppet or Chef help ensure consistency, they do not inherently simplify the process for users or administrators. Additionally, current DevOps teams are pushing changes faster than ever. Keeping pace with new services and applications often force sysadmins to use more general access rules and thus expose broader access than necessary. Rundeck is a web-based orchestration platform with powerful ACLs and ssh-based connectivity to a wide range of operating systems and devices. The simple user interface for Rundeck couples with DevOps-friendly REST APIs and YAML or XML configuration files. Using Rundeck for server access improves security while keeping pace with rapidly changing environments.


  • Data Loss Prevention Masters
    by Randy Devlin - August 8, 2016 in Data Loss Prevention

    Data Loss Prevention (DLP) continues to be a complex business-centric security initiative for organizations to overcome.


  • Changing the Perspective of Information Security in the Cloud: Cloud Access Security Brokers and Cloud Identity and Access Management Masters
    by Jennifer Johns - August 4, 2016 in Cloud Computing

    Businesses are leveraging cloud computing services at an exponential rate. Working in the information security industry during the cloud computing frenzy is exciting, but it is also proving to be challenging as cloud computing service providers (CSPs) have typically lacked industry standard security controls.


  • Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS Masters
    by Sandra Dunn - August 1, 2016 in Auditing & Assessment

    X.509 certificates are the cornerstone of brokered trust across the digital landscape both inside and outside the firewall. Often they are too trusted and become the weapon of choice for attackers looking for the easiest way to bypass the first layers of controls. Implementing additional layers of certificate quality controls using a Defense in Depth strategy reduces the X.509 certificate attack surface and ensures a reliable trust anchor.


  • Deception Techniques as Part of Intrusion Detection Strategy Masters
    by Colm Kennedy - August 1, 2016 in Intrusion Detection

    Intrusion Detection Systems (IDS) are used to help the Security Analyst detect unauthorized or suspicious activity inside a network and on Endpoints (servers, workstations). An early stage in the Hackers methodology uses Active Recon on the network to find other machines they can pivot to and maintain their presence.


  • Realistic Risk Management Using the CIS 20 Security Controls Masters
    by Andrew Baze - August 1, 2016 in Risk Management

    Does your organization spend an inordinate amount of time managing risk, when the current state of security is known to be poor, with far too few resources available to deal with the top issues?


  • Is there a Yelp for Ransomware? Incident response planning that doesnt rely on Plan B by Matt Freeman - August 1, 2016 in Incident Handling

    What if there was a service that could classify the impact of each variant of ransomware?


  • Hardware Keyloggers Masters
    by Glen Roberts - July 29, 2016 in Physical Security

    Most information security professionals are familiar with keyloggers. However, while the security industry has produced plenty of defenses for software-based keyloggers, hardware keyloggers continue to pose a daunting problem for the typical enterprise. A deeper understanding of these insidious devices can lead to viable techniques for both protection and detection.


  • Physical Security and Why It Is Important Masters
    by David Hutter - July 28, 2016 in Physical Security

    Physical security is often a second thought when it comes to information security. Since physical security has technical and administrative elements, it is often overlooked because most organizations focus on "technology-oriented security countermeasures" (Harris, 2013) to prevent hacking attacks.


  • Implementing the Critical Security Control: Controlled Use of Administrative Privileges by Paul Ackerman - July 25, 2016 in Critical Controls

    There is a plethora of information available to help organizations protect their cyber assets.


  • Polymorphic, multi-lingual websites: A theoretical approach for improved website security Masters
    by Jonathan Risto - July 25, 2016 in Web Application Security

    Web traffic is one of the largest single types of traffic on the internet.


  • Healthcare Provider Breaches and Risk Management Road Maps: Results of the SANS Survey on Information Security Practices in the Healthcare Industry Analyst Paper
    by Barbara Filkins - July 19, 2016 in HIPAA

    The number of attack surfaces continues to rise as the use of mobile medical- and health-related apps grows and as electronic health records (EHR) become ever more embedded in clinical settings. As this survey shows, many attacks stem from insiders with access, whether through simple negligence, malicious intent or just plain curiosity. To get the specifics, read on


  • Portable System for Network Forensics Data Collection and Analysis Masters
    by Don Murdoch - July 15, 2016 in Forensics

    A portable lab environment for network level analysis is a necessary tool today for the forensic analyst. With today's malicious software and myriad of network aware client- side software, one of the tools that should be in the forensic analysts' toolbox is a portable response system for data collection and analysis. This paper will explain how to build a portable forensic workstation that provides several virtual environments installed together with supplemental hardware, such as multiple NICs and modern managed switch in order to provide a network forensic tool. VM's will include pfSense 2.2 running in transparent firewall mode along with other supporting packages, a network security- monitoring platform. A cookbook approach will be used to explore common use cases for the network and system forensic analyst, such as updating rules, sharing data among multiple environments, extracting data from packet captures, and clearing out all of the tools installed to start an investigation. This paper was written to provide a build outline for using pfSense and Security Onion to achieve these goals.


  • Endpoint Security through Device Configuration, Policy and Network Isolation by Barbara Filkins and Jonathan Risto - July 15, 2016 in Clients and Endpoints

    Sensitive data leaked from endpoints unbeknownst to the user can be detrimental to both an organization and its workforce. The CIO of GIAC Enterprises, alarmed by reports from a newly installed, host-based firewall on his MacBook Pro, commissioned an investigation concerning the security of GIAC Enterprise endpoints.


All papers are copyrighted. No re-posting or distribution of papers is permitted.

Masters - This paper was created by a SANS Technology Institute student as part of their Master's curriculum.