Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine...

26
Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine [email protected] om Solutions Engineer CoreTrace Corporation

Transcript of Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine...

Page 1: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed

October 2008

Greg Valentine

[email protected] Engineer

CoreTrace Corporation

Page 2: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Today’s Endpoint Control Challenges

Current generation endpoint security solutions are no longereffective:

Malware is more targeted and increasing in volume and sophistication

Blacklisting & heuristics-based solutions are failing to catch zero day attacks

The Security — IT Operations balancing act

Frequent patching

Configuration control

Preventing UNAUTHORIZED change & rapidly allowing AUTHORIZED change

Help Desk burden

Compliance & Governance

Page 3: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Overview

Endpoint Security 1.0

Anti-virus Technology

Evolution of Malware

Malware Cloaking Techniques

Shortfalls of Endpoint Security 1.0

A Broad Look at All Security Technologies

Endpoint Security 2.0

Definition of Application Whitelisting

Implementation Philosophies

Concept of Authorized Change

Some Shortfalls

What the Press is Saying

Summary

Page 4: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Antivirus Technology

Scans files for viruses

Several Components

A virus signature database

A remediation database

A kernel driver

One or more user mode applications

Two Important Modes

Traditional disk scan

On-access scanning

Limitations

Only as good as the database

Consumes system resources

Intrusive

Page 5: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Inside On-Access Scanning

AV filter intercepts application file open

Stops the I/O and lets service scan the file

If the file contains a virus that can’t be cleaned,AV quarantines and blocks open

Antivirus Filter Driver

AntivirusService

File SystemDriver

signaturesignaturedatabasedatabase

kernelkernelmodemode

userusermodemode

Application

Page 6: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Evolution of Malware

Malware, including spyware, adware and viruses want to be hard to detect and hard to remove

Rootkits are a fast evolving technology to achieve these goals

Cloaking technology applied to malware

Not malware by itself

Example rootkit-based viruses: W32.Maslan.A@mm, W32.Opasa@mm

Rootkit history

Appeared as stealth viruses

One of the first known PC viruses, Brain, was stealth

First “rootkit” appeared on SunOS in 1994

Replacement of core system utilities (ls, ps, etc.) to hide malware processes

Page 7: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Cloaking

Visit www.rootkit.com for rootkit tools and information

Modern rootkits can cloak

Processes

Services

TCP/IP ports

Files

Registry keys

User accounts

Several major rootkit technologies

User-mode API filtering

Kernel-mode API filtering

Kernel-mode data structure manipulation

Process hijacking

Page 8: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

User-mode API Filtering

Attack user-mode system query APIs

Pro: can infect unprivileged user accounts Con: can be bypassed by going directly to kernel-mode APIs

Examples: HackerDefender, Afx

Taskmgr.exeTaskmgr.exe Ntdll.dllNtdll.dllExplorer.exe,Explorer.exe,Winlogon.exeWinlogon.exe

user modeuser mode

kernel modekernel modeExplorer.exe, Explorer.exe, Malware.exeMalware.exe, Winlogon.exe, Winlogon.exe

RootkitRootkit

Page 9: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Kernel-mode API Filtering

Attack kernel-mode system query APIs

Pro: very thorough cloakCons: requires admin privilege to install

difficult to write

Example: NT Rootkit

Taskmgr.exeTaskmgr.exe Ntdll.dllNtdll.dll

user modeuser mode

kernel modekernel mode

RootkitRootkit

Explorer.exe,Explorer.exe,Winlogon.exeWinlogon.exe

Explorer.exe,Explorer.exe,Winlogon.exeWinlogon.exe

Explorer.exe, Explorer.exe, Malware.exe,Malware.exe, Winlogon.exeWinlogon.exe

Page 10: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Explorer.exeExplorer.exe Malware.exeMalware.exe Winlogon.exeWinlogon.exeActiveActive

ProcessesProcesses

Kernel-mode Data Structure Manipulation

Also called Direct Kernel Object Manipulation

Attacks active process data structure

Query API doesn’t see the processKernel still schedules process’ threads

Pro: more advanced variations possibleCons: requires admin privilege to install

can cause crashes detection already developed

Example: FU & FU2

Page 11: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Process Hijacking

Hide inside a legitimate process

Pro: extremely hard to detect

Con: doesn’t survive reboot

Example: Code Red

Explorer.exeExplorer.exe

MalwareMalware

Page 12: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Malware Is a Booming Business!

www.av-test.org — 2008

Page 13: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

“Larger Prey are Targets of Phishing”(April 16, 2008)

More than 2000 executives infectedDetected by fewer than 40% of current AV products

11 User baited with false subpoena e-mail

22 User opens document

33Downloads keylogger or remote access Trojan

Page 14: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Even Blacklist-based Vendors Agree —A New Approach Is Needed!

“The relationship between signature-based antivirus companies and the virus writers is almost comical. One releases something and then the other reacts, and they go back and forth. It's a silly little arms race that has no end.”

Greg Shipley • CTO, Neohapsis

“If the trend continues and bad programs outnumber good ones, then scanning for legitimate applications (whitelisting) makes more sense from both an efficiency and effectiveness perspective.”

Mark Bregman • CTO, Symantec Corp.

“Authenticate software that is allowed to run and let nothing else run. Anti-virus is a poor IT Security solution because it doesn’t do that. Instead it tries to spot software it thinks is bad. Anti-virus comes from a bygone era and that is where it belongs.”

Robin Bloor • Partner, Hurwitz & Associates

Page 15: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Protecting Critical Systems —What Is Needed Today?

Gartner’s Nine Styles of HIPS Framework

ExecutionLevel

ApplicationLevel

NetworkLevel

Allow Known Good(Block All Else)

ApplicationControl

Application andSystem Hardening

HostFirewall

Block Known Bad(Allow All Else)

ResourceShielding

Antivirus

Attack-FacingNetwork Inspection

Unknown

BehavioralContainment

ApplicationInspection

Vulnerability-FacingNetwork Inspection

Page 16: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Ogren Group:The Three Tenets of Endpoint Security

1. Control what you know

Easier to control what is known than try to control unknown attacks.

2. Control at the lowest possible level

Only security software that functions in the kernel can reliably deliver the controlsthat IT requires.

3. Control transparently

Security must be transparent to end-users and not create administrative burdento operational staff.

Page 17: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Definition of Application Whitelisting

What is Whitelisting?

List of ‘Good’ Applications

Objectives

Tracking ApplicationsOnly Listed Applications RunListed Applications are ‘Good’

Some Currently Used List Attributes

Signed BinariesMicrosoft Group Policy ObjectsHashed ExecutablesSimple Executable Names w/Release DatesCombinations of these

Page 18: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Philosophy of ‘Good’

How do you Determine Good?

Trusted SourceSigned BinaryMega-whitelist Database

What do you do with Unknowns?

Recently Released ApplicationsProprietary ApplicationsMiscellaneous dlls, drivers, etc.

CoreTrace Position

Build Whitelist from the Systems ThemselvesIdeally Start with a New, Clean System

Page 19: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Kernel-Level Application Whitelisting

Protect from within the kernel of the OS

Enforce a whitelist of approved applications only

Extend the whitelist to include memory protection

Utilize minimal system resources

User Space

Kernel Space / OS

System Resources

WhitelistedApplication

RogueApplication

Page 20: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Enhance IT Operations

Security - IT Operations Balancing Act

Frequent Patching

Image Management

Preventing UNAUTHORIZED change & rapidly allowing AUTHORIZED change

Application Whitelisting must Allow Authorized Change

Periodic Application and Operating System Updates

Applications Available from Internal Server

Ad-hoc Application Installation by Authorized Users

Application Whitelisting can Enhance Operations

Patch on a Controlled Schedule

Allow Users Access to Approved Applications

Control Authorized Applications on Every Endpoint

East to Enforce, Monitor, and Report for Compliance

Page 21: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

DeployClient to

Multiple Endpoints

Auto-GenerateCustom Whitelistfor Each Endpoint

AutomaticallyEnforce Whitelist

(Stopping UnauthorizedApplications & Malware)

Report on Security or Configuration Issues

Update CustomWhitelist for New

Trusted Applications

EstablishTrust Models in

Administrator Console

How Authorized Change should work:

EstablishTrust Models in

Administrator Console

Trusted Updater:SMSAdmin.exe

Trusted Application:Project.msl

Trusted Network Share:\\server\share\

Trusted User:CORP\TomJ

Trusted Digital Certificate:Microsoft Windows

Page 22: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Positive Environment for Users

User Expectations are Already Set

Company Policies

Compliance Requirements

Daily Business Operations

What can the User do on the Personal Computer?

Whitelist Policy can Match Up

Power User Allowing Regular Changes

Regular User Allowing Updates for Approved Software

Single Purpose System in Lockdown Configuration

Control and Monitor Change

Oversee Problem Users

Reporting for Compliance

Redirect Corporate Culture as Required

Page 23: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

What Does it Do For Me?

Only authorized code can execute

No zero-day threats

No chronic signature updating

No paying for chronic signature updating

Benefits of an Application Whitelisting approach

Blocks malware and unlicensed/ unauthorized software from installing and executing

Eliminates reactive security patching

Eliminates unplanned or unmanaged configuration drift

Shortfalls of the Technology

Privilege escalation via vulnerability exploitation

Doesn’t prevent data modification or theft

Some browser exploitation, e.g. certain plug-ins

Page 24: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Press Coverage for Whitelisting is Exploding

Security Vendors Embrace Application Whitelisting

Antivirus is 'completely wasted money': Cisco CSO

Security experts look to 'whitelisting' future

Coming: A Change in Tactics in Malware Battle

Whitelisting and Trust

The Real Dirt on Whitelisting

Black versus White

Redefining Anti-Virus Software

McAfee CEO: Adware is killing AV blacklisting

Page 25: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Summary

Application Whitelisting is the new foundation of endpoint control

Application whitelisting solutions must be able to easily andimmediately handle change

Application Whitelisting dramatically lowers endpoint TCO

Automatically prevents unauthorized and unplanned change

Easily allows authorized and planned change

Automatically meets compliance requirements for control and visibility

Dramatically improves security — with significantly less effort

Page 26: Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine gvalentine@coretrace.com Solutions Engineer CoreTrace.

Thank You!

Greg [email protected]